Aug 12 - 13

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

List of exhibitor products

The Internet Security, Performance, and Reliability company

Cloudflare

Security 
1) Advanced DDoS Protection
Fast, globally distributed and intelligent protection against sophisticated DDoS attacks
Protect your Internet properties with a cloud-based, always-on DDoS protection, powered by the intelligence harnessed from Cloudflare’s always learning global network. 
2) Data Breach Prevention
Protect applications from attacks resulting in sensitive customer data compromise
A data compromise can result in the leak of sensitive customer information, such as credit cards, passwords, and other personally identifiable information (PII), from an application's data store. Attackers often use several attack vectors when attempting to compromise customer data, such as DNS spoofing, snooping of data in transit, brute force login attempts, or malicious payload exploits.
The global cost of a data breach on average, per lost or stolen record, is $141 in 2017, and the average total cost of a data breach in the US is $3.62 million. With heightened scrutiny by governments and media, companies are facing severe repercussions from even the smallest data compromise. Business impacts include lost customers and revenues, degraded trust, damaged brand, or regulatory penalties.
Websites and applications require the resilience and intelligence of a scalable network to combat the most sophisticated and newest attacks. Protecting against threats should not degrade performance caused by security induced latencies, and security services must be easy to configure to eliminate misconfigurations, which introduce new vulnerabilities.

Performance
1) Accelerate Mobile Experiences
Increase engagement and conversions, regardless of distance to origin servers, device type, or network health
Mobile visitors expect fast, rich online experiences. Mobile device and cellular network limitations can degrade a users mobile experience, resulting in lower conversions, loss of revenue, and degraded brand perception.
Mobile applications and web pages require the speed and scale of a global network to combat mobile-induced latencies and globally dispersed users with poor connectivity. Cloudflare optimizes image files for mobile consumption and provides developers with tools to improve native mobile app performance on challenging networks.
2) Accelerate Internet Applications to Increase Conversion Rates
Deliver fast, rich user experiences for Internet applications that increase engagement and conversions, while reducing costs.
Consumers expect web pages to load quickly. Slow page load times can lead to high bounce rates, page abandonment, and lower conversion rates. Web pages are becoming increasingly complex and users are more globally dispersed; which degrades the user experience. Cloudflare brings content closer to your users by caching static web content on its network. Image files can be optimized to significantly improve load times, and dynamic content can be compressed and routed on the fastest, least congested path to the end-user.

Dr.IP

e-SOFT CORP.

Thunder Convergent Firewall (CFW)

A10 Networks

A10 Networks Thunder Convergent Firewall (CFW) is the industry’s first security solution that incorporates multiple security functions for enterprise and service provider deployments, including highly scalable and high-performance firewall, IPsec VPN, secure web gateway, Carrier-Grade NAT with integrated DDoS protection and traffic steering in a single, standalone product.

CrowdStrike Falcon

CrowdStrike

The CrowdStrike Falcon® platform is pioneering cloud-delivered endpoint protection. It both delivers and unifies IT Hygiene, next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence — all delivered via a single lightweight agent. Using its purpose-built cloud-native architecture, the Falcon platform collects and analyzes over 1 trillion endpoint events per week from millions of sensors deployed across 176 countries.

Enterprise Immune System

Darktrace

The Enterprise Immune System is a self-learning cyber AI technology that detects novel attacks and insider threats at an early stage.

Modeled on the human immune system, the Enterprise Immune System learns and understands ‘self’ for everyone and everything in the business, and can spot the subtle signals of an advanced attack — without relying on rules, signatures, or prior assumptions.

Industrial Immune System

Darktrace

The Industrial Immune System is a fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time.

This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations.

Darktrace Antigena

Darktrace

Darktrace Antigena is the world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds — when security teams are overwhelmed or simply aren’t around.

The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments.

DXC Security Services

DXC Technology

Build digital security into the fabric of your enterprise.
Enterprises are facing more sophisticated and more persistent attacks, both from outside and within, while they’re under pressure to take advantage of emerging digital technologies.
DXC Technology serves as a trusted advisor and primary security integrator to protect your enterprise and enable your digital transformation. Backed by more than 3,500 security experts and a global network of 24x7 security operations centers, DXC’s industry-leading solutions help protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats.

DXC Analytics Services

DXC Technology

Business insights deliver the most value when they’re fresh. DXC Technology offers analytics services and a robust partner ecosystem to help you uncover and apply insights rapidly to improve business outcomes. Our Analytics Services accelerate your ability to uncover valuable insights and apply them quickly to improve business outcomes.
 

Next Generation Firewall,NGFW

FORCEPOINT

Enterprise SD-WAN Meets the #1 
Most Secure Next Gen Firewall

HENNGE Access Control

HENNGE Taiwan

✔︎ Cloud Authentication and Single Sign-On service, including MFA digital certification like OTP etc.
✔︎ Provides single interface to manage users and synchronize users and password information from AD.
✔︎ Monitor logins to reduce the risk of unknown device accessing.
✔︎ Set access IP restrictions to keep company information from being accessed outside of office.
✔︎ With Device Certificate and Secure Browser, it is able to keep restrictions and flexibility.

HENNGE Email Archive

HENNGE Taiwan

✔︎ Unlimited storage for archiving Email. 
✔︎ Keep Email forever or delete it regularly to comply with company's requirement.
✔︎ Fits the requiremants of ISO 27001.
✔︎ Easy to search and send backup Email back by using simple web interface.
✔︎ Easy to control searching-authority which made handover and audit more convenience.

HENNGE Email DLP

HENNGE Taiwan

✔︎ Effective way to prevent sensitive data leaks by automatic Email keyword filter.
✔︎ Customize rules to fit company's DLP policy.
✔︎ Automatically encrypt email attachments.
✔︎ Special function which Email with sensitive data will only be sent after getting supervisor's approval. 

HENNGE Secure Transfer

HENNGE Taiwan

✔︎ Safe, quick, easy-to-manage way to transfer large files.
✔︎ Transfer LOG for admin to track and audit.
✔︎ No additional software is required, can be used immediately with browser.

ObserveIT

JSLead

ObserveIT- Insider Threats Management Solution

 

LogRhythm

JSLead

LogRhythm - NextGen SIEM Platform

 

Thycotic

JSLead

Thycotic - Privileged Access Management Solution

 

SQream

JSLead

SQream - The GPU-Accelerated Data Warehouse for Massive Data

 

LogRhythm

LogRhythm

LogRhythm - The NextGen SIEM Platform - Align your team, technology, and process to see broadly across your environment, uncover threats, and minimize risk — all within a single, unified platform. It’s at the center of thousands of SOCs worldwide.  
For more information visit: https://logrhythm.com/

2019 Awards & Recognition
2019 Gartner Peer Insights Customers' Choice - Gold Award
2019 SC Media Best SIEM Solution
2019 InfoSec Awards Market Leader for User Behavior Analytics
2019 InfoSec Awards Market Leader for Security Information Event Management (SIEM)

ObserveIT

ObserveIT

The ObserveIT platform correlates activity and data movement, empowering security teams to identify user risk, detect to insider-led data breaches, and accelerate security incident response.  Leveraging a powerful contextual intelligence engine and a library of over 400 threat templates drawn from customers and leading cybersecurity frameworks, ObserveIT delivers rapid time to value and proven capability to streamline insider threat programs.
. Protect from Data Loss 
. Identify User Risk
. Accelerate Incident Response
. Bridge Compliance Gaps
For more information visit: https://www.observeit.com/

2019 Awards & Recognition
2019  Black Unicorn Awards
2019  Best Product Insider Threat Detection
2019  InfoSec Awards Best Product for Insider Threat Detection
2019  Info Security Products Guide Global Excellence Awards「Gold Winner for Insider Threat Solution」

SQream

SQream

SQream - The GPU-Accelerated Data Warehouse for Massive Data: Redefined big data analytics with SQream DB, a complementary SQL data warehouse harnessing the power of GPU to enable fast, flexible, and cost-efficient analysis of massive datasets of terabytes to petabytes. 

For more information visit: https://sqream.com/"

Tenable.sc

Tenable

The Tenable.sc Cyber Exposure platform solution manages cyber risk across the modern attack surface and provides total visibility and analytics into cyber risk across IT, Cloud, IoT and OT environments.

Tenable.io

Tenable

Tenable.io provides the actionable and accurate data you need to identify, investigate, and prioritize the remediation of vulnerabilities and misconfigurations in your modern IT environment.

Nessus Pro

Tenable

The #1 vulnerability assessment solution. The industry’s most accurate, comprehensive and widely adopted solution for point-in-time vulnerability assessments. Built for security practitioners, by security practitioners.

Thycotic Secret Server

Thycotic

Thycotic - Privileged Access Management (PAM) Solution,  a comprehensive solution for enterprise password management that eliminates the drudgery and decreases risks, rotate passwords, simultaneously update credentials used for services and applications without downtime. Built-in workflow capabilities and detailed reporting that gives you maximum control and flexibility.  
For more information visit: https://thycotic.com/

2019 Awards & Recognition
2019 Gartner Peer Insights Customers’ Choice for PAM
2019 InfoSec Awards Next Gen for Privileged Account Security Winner
2019 Info Security Products Guide Best Deployments and Customer Success Gold Award
2019 Info Security Products Guide New Products and Services Bronze Award
2019 Info Security Products Guide Best Overall Security Company of the Year Bronze Award

Billows OneMan SOC

Billows

Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT are collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery, Threat intelligence and etc…Providing relevant SIEM's  correlation rules and signatures of the latest information security attacks. Furthermore, our platform combined with AI analysis module for the efficiency and accuracy of detecting malicious behavior.
 
In addition to continuous internal monitoring and improving the credibility of security incidents, our platform provides automatic or manual updated correlation rules. Allowing security administrators to detect and respond to security incidents immediately, improving the status of security in a timely manner.
 
Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is a new malicious IP / URL information, we can block it automatically through our proactive defense system .
 
 When an emergency incident needs to be reported and handled immediately, you can use our platform to share information with ISAC and record all the incident response procedures. Our OneMan SOC platform assists in the entire process management workflow: from generating notification forms to completing the entirety of each case. Helping clients to automatic their internal process and secure their system.

AT&T Cybersecurity-AlienVault USM

Billows

AT & T Cybersecurity’s AlienVault USM is an all-in-one platform. Unlike traditional SIEM or security point products. The USM Appliance platform provides five security essential s in a single console, giving you everything you need to manage both compliance and threats. Including: 

Asset discovery, 
Vulnerability assessment, 
Intrusion detection
Behavioral monitoring
SIEM

The main capability of USM comes from Open Threat Exchange(OTX). The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. OTX has gathered more than 80,000 users from 140 countries around the world. Through the platform, more than 19 million potential threats are shared daily. The USM is updated every 15 minutes and audited OTX information, so it can detect almost all kinds of real-time threats flowing around the world.

In addition, AT & T joins the Global Telco Security Alliance consisting of Softbank, Etisalat, Singtel, and Telefónica. 
Alliance combines resources and capabilities of telecom operators to help protect all types of businesses from the growing threat of sophisticated cyber-attacks.

The inclusion of AT&T heightens the Alliance’s ability to share insights and best practices for customers globally by harnessing the expertise of more than 6,000 security experts and a global network of more than 28 Security Operations Centers. Combined, the members of the Alliance now cover more than 1.2 billion customers in more than 60 countries across Asia-Pacific, Europe, the Middle East and the Americas.

Billows LogMaster

Billows

This platform allows collecting, compressing and saving large volumes of raw logs to fulfill all the basic requirements of regulation. It can integrate with other reporting software to effectively visualize the internal information. Additionally, users can also automatically forward security logs to their threat analysis platform based on their cyber security analysis requirements.
Log Management: collecting, preserving normalized/ unnormalized log data and non-repudiation verification. Keep track all the data lifecycle. Make sure all the necessary data will be preserved as the regulation asks.
Threat analysis: Integrating analysis within inbuilt threat intelligence modules so as to detect abnormal events.
Integration module: This module can help administrator integrated with other SIEM or Reporting software.

Billows ISAC Information Security Incident Notification System

Billows

In accordance with the requirements for reporting security incidents of the Cyber Security Management Act, when a security incident occurs, it must be reported to a higher-level unit. Therefore, with this platform receiving incident information and verify whether the incident needs to be reported. From generating the specific report format in compliance with the standard procedure automatically to process and complete the entirety of each case in accordance with National Center for Cyber Security Technology’s standardized format. Enhancing the immediacy, correctness and integrity of information, while instant sharing the incident information in helping to secure and reinforce the overall response.

Intention Prediction as a Service, IPaaS

Core Cloud

Core Cloud IPaaS combines full spectrum threat detection, predictive analytics and automated mitigation to eliminate advanced threats.

IDC

Digicentre

Digicentre uses secure, high-performance, and cost effective infrastructure. With professional expert advice digicentre  provide tailor-made solutions for customers’ operating demands.

Cloud

Digicentre

Highly integrated local and virtual services designed for large-scale computing.

Security

Digicentre

With decades of security experience, digicentre  protects clients in 95 countries.  This includes 60,000 computers and over 6 million attacks every day. Digicentre  protects customers from attacks and security risks.
 

App Security

Digicentre

Protect developers from revenue loss, hackers tampering with in-game purchase systems, source code theft, fraud, or application credentials being compromised.

WhatsUp® Gold

EC-NETWORKER

MOVEit Transfer

EC-NETWORKER

Ipswitch Gateway

EC-NETWORKER

Unified Threat Prevention Platform

ESI Taiwan

The Morphisec Unified Threat Prevention Platform, built on moving target defense, is architected to deterministically block advanced threats such as fileless malware, exploits, and zero-day attacks without needing to detect signatures or relying on behavioral analysis.

Fidelis Elevate™

Fairline Technology

Automate Detection.
Automate Response.
Prevent Data Theft.

One unified platform ensures faster detection and automated response – providing accuracy, clarity and certainty for your cyber security team.

Elevate Security Operations
Even with many prevention tools in place, organizations are still getting breached. That's why more organizations are shifting from a prevention-focused approach to a detection and response strategy.
Fidelis Elevate is the only security operations platform that provides deep visibility, threat intelligence and context across complex environments to automate detection and response.

A Force Multiplier for Your Security Operations
Fidelis Elevate™ integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.

Enhance Your Visibility and Detection Capabilities

1. Inspect all ports and protocols
2.See north-south traffic, lateral movement and data exfiltration
3. Enrich alerts with data and context from Fidelis Network®, Fidelis Endpoint®, and Fidelis Deception™– all in a unified platform
4. Combine threat intelligence, sandboxing, machine learning, deception, and Fidelis research
5. Capture and store metadata for analysis and threat hunting
Automate Response for Quick and Effective Resolution

1. Draw conclusions with accuracy by automatically collapsing many alerts and events into a single view
2. Automatically validate network alerts on the endpoint with certainty
3. Raise the priority level when evidence is found of increased risk
4. Automatically execute a response playbook to jumpstart your investigation with clarity
5. Stop data leakage, command and control, and active attacks

Imperva

Fairline Technology

Imperva Data Security
Keep your customers’ trust, and safeguard your company’s reputation with Imperva Data Security. We protect data wherever it lives, on-premises or in the cloud, and give you actionable insights into dangerous user activity that puts your data at risk.

Imperva Application Security
We provide multi-layered protection to make applications and websites always available, always user-friendly, and always secure.

Fidelis Endpoint®

Fairline Technology

ThreatARMOR
Help Protect from 
Zero Day Malware Mutations

Provides full line-rate performance
Eliminates 30% of alert-generating connection attempts, and yields a 15x return on investment in a single year
Updates threat data every 5 minutes with cloud-based Application Threat Intelligence (ATI) feed
Delivers clear on-screen proof of malicious activity for any blocked sites
Offers on-box and off-box logging of blocked connections and system events
Features easy 30-minute setup, with no ongoing tuning or maintenance required
Provides an intuitive, on-screen dashboard displaying blocked sites, countries of origin, and statistics
Combine with Ixia Bypass switches to provide additional resiliancy of ThreatARMOR and other security infrastructure

Fidelis Elevate™

Fidelis

Prevent Data Theft.

One unified platform ensures faster detection and automated response – providing accuracy, clarity and certainty for your cyber security team.

Elevate Security Operations
Even with many prevention tools in place, organizations are still getting breached. That's why more organizations are shifting from a prevention-focused approach to a detection and response strategy.
Fidelis Elevate is the only security operations platform that provides deep visibility, threat intelligence and context across complex environments to automate detection and response.

A Force Multiplier for Your Security Operations
Fidelis Elevate™ integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.

Enhance Your Visibility and Detection Capabilities

1. Inspect all ports and protocols
2.See north-south traffic, lateral movement and data exfiltration
3. Enrich alerts with data and context from Fidelis Network®, Fidelis Endpoint®, and Fidelis Deception™– all in a unified platform
4. Combine threat intelligence, sandboxing, machine learning, deception, and Fidelis research
5. Capture and store metadata for analysis and threat hunting
Automate Response for Quick and Effective Resolution

1. Draw conclusions with accuracy by automatically collapsing many alerts and events into a single view
2. Automatically validate network alerts on the endpoint with certainty
3. Raise the priority level when evidence is found of increased risk
4. Automatically execute a response playbook to jumpstart your investigation with clarity
5. Stop data leakage, command and control, and active attacks

Fidelis Network®

Fidelis

Best-of-Breed Breach Detection and Data Loss Prevention (DLP)
Gain visibility into content over all ports and protocols to detect threats and prevent data loss.

See More, Inspect More
Identifying threats and data leakage requires deep inspection and analysis of all forms of content, including unpacking and extracting deeply embedded files. Fidelis Network bi-directionally scans all network traffic, regardless of port or protocol, to reveal the network and application protocols, files, and content.

Never miss an attack or data leaving your network
1. Patented Deep Session Inspection® as well as Deep Packet Inspection gives you unique visibility across all ports and protocols.
2. By capturing and storing all metadata traffic, you can use with automated analytics or make available for improved threat hunting.
3. Automatically discover and classify data on your network to prevent unauthorized transfers out of your network.

Detect Threats
By conducting real-time network analysis and identifying behaviors that indicate compromises, Fidelis Network provides automated detection for the proactive discovery of attackers, suspicious hosts, and malware.

Real-time and retroactive detection
1. Detect and prevent infections at line-speed with real-time network analysis uncovering initial compromises, suspicious hosts, malware and compromised hosts.
2. Learn about past attacks with retroactive analysis of stored metadata triggered by key indicators derived from threat intelligence, machine learning, sandbox results and Fidelis research to understand attacker TTPs and prevent future attacks.

Eliminate Alert Fatigue
Fidelis Network automatically validates, correlates, and consolidates network alerts against every endpoint in your network. Minimize false positives and shift from clues to conclusions so you can quickly address the alerts that matter most.

Focus on what matters
1. Gain critical context and save valuable time by automatically validating, correlating and consolidating network alerts across every endpoint.
2. Make time-sensitive decisions with pre-staged evidence in one view. Suspicious network data, rich content and files are all assessed against industry-best security analytics and rules.

Prevent Threats
Fidelis Network includes multiple sensors that can be placed throughout your network to enforce prevention policies. These sensors can be placed inline or out-of-band based on your network configuration and prevention tolerance.

Terminate threats in progress
1. Drop sessions in real-time in response to detected policy violations with inline or out-of-band sensors.
2. Analyze email content (even when encrypted) and prevent compromises by dropping, re-routing or quarantining email messages with the email sensor.
3.  Redirect web pages or drop sessions with the web sensor.

Detect and Prevent Data Loss
Fidelis Network detects and prevents data theft by utilizing our industry-best content decoding and inspection engine. Get ultimate visibility of exfiltration attempts and keep your sensitive data safe.

See everything leaving the network
1. Analyze network sessions over time to detect data leakage thanks to stored metadata.
2. Prevent loss of critical and sensitive data through standard and non-standard ports.
3. Automatically confirm and stop data theft with deep content inspection of all outgoing network activity.
4. Gain accurate alerts with clear forensic evidence of data exfiltration.

Fidelis Deception®

Fidelis

Deception Technology-Reduce dwell time by quickly detecting post-breach attacks

Cyber deception defenses provide a proactive opportunity to lure, detect and defend early within post-breach compromise incidents. Alerts come from deception layers unknown to users resulting in low-risk alerts via emulation with high fidelity and no false positives. The result is a low friction, low risk accurate alarm system to detect post-breach attacks.

Automatically Discover and Classify Networks and Assets
Classify all networks and assets, communication paths, and network activity to profile your users, services, and systems. Gain visibility of servers, workstations, enterprise IoT devices, legacy systems and shadow-IT, and ensure an always-current profile as changes occur within your environment to automatically adapt deception layers.

Automatically Create and Deploy Deception Layers
Following the automated discovery of an environment, Fidelis Deception uses accurate information to auto-generate decoys for deception layers. Decoys have profiles, services and regular activity matching the environment, plus recommended breadcrumbs for placement on nearby real assets to act as lures to decoys.

Lure Attackers to the Deception Layer via Breadcrumbs
Easily configure breadcrumbs on real assets and in Active Directory to lure cyber attackers, malicious insiders and automated malware to the deception layer. Breadcrumb options include files, documents, email, system resources and more.

GigaSECURE® Security Delivery Platform

Gigamon

GigaSECURE® is purpose-built to reduce architectural complexity, stop tool sprawl and contain costs. Deliver relevant network data to downstream inline threat prevention tools at the rate they can consume.

GigaVUE Visibility Appliances

Gigamon

GigaVUE® Visibility Appliances deliver consistent insight into data that travels across your network, including data centers and remote sites. With the Gigamon solution, you will have the coverage and control you need to safeguard critical network and business assets.

GigaVUE-HC3

Gigamon

The GigaVUE-HC3 visibility node offers up to 25Tbps of traffic intelligence processing across 32 clustered nodes. The GigaVUE-HC3 enables global 2000 enterprises, government agencies and service providers to gain deeper insight into network traffic, minimize traffic overload and provide more effective options to deploy both inline and out-of-band security tools.

ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability)

Global Wisdom

ANCHOR(Ark of Network, Cyber Hamper for Operations Reliability) starts with the spirit of ISO and best practice experience. Each management link in the privileged account lifecycle (certification, application, review, activation, notification, connection, monitoring, reporting, auditing) corresponds to the managing process and auditing requirements and other functions that constitute a centralized managing platform to save the traditional high cost of implement and time costs.
This product uses single portal to complete the privileged account lifecycle management, includes controlled device/group authorization management, temporary ID/connection/password application, audit, auto sign-in, live monitoring, playback, reporting and audit workflow. To exempt unnecessary risks and avoid maintenance disputes, the controlled-device does not need to be installed any software or opened catalogue (Agent-less). It is a solution with best security, best convenience, best initiative, best immediacy, best importability and best usability.

IP-guard Endpoint Protection

IP-guard

Designed to protect and manage endpoint computers against potential data theft by recording end-user operation logs and enforcing corporate policies and regulations. IP-guard provides end-user operation analysis by collecting detailed document, application, website, peripheral and many other operation logs. Whilst collecting user logs the IP-guard can generate real-time warnings alerts to notify any unauthorized behaviors and intervene operation against corporate policies.

IP-guard Data Discover

IP-guard

Designed to scan existing documents to detect predefined keyword and patterns within the documents.  IP-guard data discover work in conjunction with IP-guard V4 endpoint protection and IP-guard V+ document encryption to prevent detected documents been copied, mail or uploaded etc. to unauthorized medium. 

IP-guard V+ Document Encryption

IP-guard

A robust and reliable document encryption system that automatically encrypt documents on creation to ensures documents only accessible in the authorized environment.  Apart from the traditional encryption methodology, IP-guard V+ Document encryption emphasis on the smoothness of data transfer within the organization and between supplier and vendors. IP-guard's USB agent, offline reader facilitates the obstacle when opening encrypted document outside authorized environments. 

  • Type:Encryption
  • IP-guard Encryption Security Gateway

    IP-guard

    Designed to work in conjunction with IP-guard V+ Document Encryption system to avoid customization with existing ERP, CRM, revision control system and act as the gateway to prevent any unauthorized device interact with abovementioned systems.

    IP-guard NAC

    IP-guard

    Designed to increase the safety of the network by limiting the availability of network resource to endpoint computers. IP-guard NAC works in conjunction with IP-guard endpoint protection to deny network access to computers who do not meet the minimum requirement of corporate regulation.

  • Type:NAC
  • DIGITAL GUARDIAN Data Protect Platorm

    iSecurity Inc.

    Digital Guardian is a next-generation data protection platform built to prevent corporate data leakage. This platform makes it easier and clearer for IT / Security personnel to understand corporate networks, traditional endpoint devices and server hosts, mobile devices, and cloud applications in order to more easily view and prevent all threats of sensitive data leakage.

    Digital Guardian is the only product developed by Verdasys since its establishment in 2003. Verdasys focuses only on the field of Data Loss Prevention (DLP). THe protection modules related functions are all designed based on protecting corporate assets and avoiding leakage of corporate data. 

    In order to  meet the benefits and benefits that Digital Guardian can bring to customers, Verdasys decided to change the company name to the well-known Digital Guardian, which is also a name familiar to the broad customer base using Digital Guardian. DLP will definitely think of Digital Guardian (DG)!

    UNIDIRECTIONAL SECURITY GATEWAYS

    iSecurity Inc.

    The purpose of Waterfall Unidirectional Security Gateways (USG) is to replace the firewall equipment in the industrial network environment, to provide an absolutely secure protection of the control system and the maintenance network to avoid attacks from external networks. A firewall device is absolutely capable on a general Information Technology (IT) network. However, when an Operational Technology (OT) network requires an absolutely secure network channel, the strength and reliability of the firewall device are not sufficient because:

    1. The firewall has an operating system, a central processing unit, memory, and storage space:
    Therefore, there may be software vulnerabilities and hardware defects that may cause the firewall device to be bypassed.

    2. The firewall is artificially set:
    Therefore, there may be artificial configuration errors (Misconfiguration), allowing the rules of the firewall device to be changed.
    3. The firewall relies on network communication to transmit:
    Therefore, 3-way handshake for network communication is still needed for communication, which is still essentially two-way network communication.

    Therefore, Waterfall has developed products such as Unidirectional Security Gateways to address the above issues.

    Radiflow iSID

    iSecurity Inc.

    Radiflow iSID Industrial Threat Detection System is a server platform application for SCADA networks that analyzes network traffic in OT operating environments to prevent cyber threats.

    Radiflow iSID combines two different capabilities: SCADA / ICS automatically learns network modeling asset inventory and network behavior abnormality detection, utilizes receiving all network traffic (Mirroring or TAP), and analyzes and generates network topology models, and Non-benchmark behavior as a detection indicator. It can further enhance the functions of iSID through integration with third-party product solutions, including integration with Aperio's malicious behavior analysis database and Darkgnet attack intelligence from Sixgill.

    feature of product:
    1. Automatic learning of network topology and operation behavior
    2. Network traffic analysis of SCADA's DPI protocol
    3. Monitor configuration changes in the PLC
    4. Anomaly detection and analysis for the model
    5. Known vulnerability detections for signature files
    6. Non-intrusive network operation
    7. Central or distributed deployment
    8. Automatic learning reduces false alarm rate

    IDS analysis will analyze the received packets for Deep Packet Inspection (DPI), classify and inspect the bandwidth used and ICS industrial network protocols, access ports and traffic between connected devices. Judge by changes between parameters and conditions that meet normal or abnormal behavior. The detection process is continuously fine-tuned based on known behavior, automatically through a properly defined self-learning process.

    To this end, IDS provides six core functions:
    1. Network Visibility: Based on SCADA network auto-learning, it scans all ICS traffic by passive (optional: active) to identify all devices in the OT environment.
    2. Maintenance Management: Monitor whether the maintenance operation is legal at a specific time or device, and leave an audit record.
    3. Cyber ​​Attacks: Continuously detect PLC specific and specific agreement vulnerabilities or suspicious command attacks.
    4. Policy Monitor: Define policies on each pair of device connections and detect compliance.
    5. Anomaly Detection: Compared to the previously defined normal network benchmarks, it detects abnormal activities, including device updates, network topology changes, abnormal access, and firmware change monitoring.
    6. Measuring Operational Behavior: Detects abnormal delays in the connection, and packet loss and retransmission rates caused by excessive load.

    NetSkope

    iSecurity Inc.

    Provides SaaS, IaaS and Web security protection through a single cloud platform. Visibility, granular access control, DLP can be provided no matter where employees are located or using any device.

    Unified Threat Prevention Platform

    Morphisec

    The Morphisec Unified Threat Prevention Platform, built on moving target defense, is architected to deterministically block advanced threats such as fileless malware, exploits, and zero-day attacks without needing to detect signatures or relying on behavioral analysis.

    Netfos Cyber Security Solution

    NetFos Technology Corporation

    Identity and Access Management Solution

    One Identity

    One Identity Identity and Access Management (IAM) solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. With our solutions, you can enhance your organization’s agility while you address IAM challenges from on-premises, cloud and hybrid environments.

    Privileged Access Management Solution

    One Identity

    One Identity Privileged Access Management solutions mitigate security risks and help you achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access to critical organizational data and applications. Our privileged access management solutions enable you to provide the full credential when necessary or limit access with granular delegation for least privileged access. All privileged activity is recorded and all keystrokes are logged with real-time analyzation of activity and data. This eliminates shared credentials and assigns individual accountability to administrator activity with the ability to detect and halt unknown threats immediately. The result is enhanced security and easier compliance with more efficient administration and governance of privileged access.
     

    Active Roles

    One Identity

    One Identity Active Roles delivers automated user account and group management that overcomes the shortcomings of native Microsoft Active Directory and Azure Active Directory tools. These enhanced identity-management capabilities enable you to do your job more efficiently, more accurately, and with less manual intervention. Active Roles is designed with a modular architecture, so your organization can easily meet your business requirements today and in the future. With Active Roles, you can automate tedious and error-prone administrative tasks and solve security issues by protecting and controlling all-important administrative access.

    One Identity Safeguard

    One Identity

    One Identity Safeguard can reduce the stress and worry with your privileged accounts. This innovative privileged access management solution – available as an easily deployed, hardened appliance – gives your organization a secure way to store, manage, record and analyze privileged access. It is an integrated solution that combines a secured and hardened password safe, and a session-management and -monitoring solution with threat detection and analytics. Safeguard detects and shuts down threats while satisfying your auditors and admins.

    Change Auditor

    One Identity

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats to AD and other Microsoft platforms, and can go undetected without protections in place.
    Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.

    Openfind Secure Cloud Service

    Openfind

    OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency. 

    MailGates Mail Protection System

    Openfind

    The MailGates mail protection system is deployed in front of corporate mail servers. To provide users with comprehensive anti-spam protection, global and local samples are analyzed on the mail cloud to identify all e-mail attack behaviors and threats, provide real-time anti-virus protection, as well as automatic detection and filtering of spam.
    The reliable and high-performance system environment, clear and succinct statistics reports and logs, as well as comprehensive and user-friendly administration functions with industrial-level mail management requirements. The MailGates mail protection system will continue to refine its mail protection functions and build the most secure, smooth and reliable channel for e-mail delivery and receiving.
    More Information:https://www.openfind.com.tw/english/downloads/MailGates_EN.pdf

    Mail Archive and Management System

    Openfind

    MailBase Replication Mode makes the archiving of e-mails easy and requires absolutely no changes to the existing network structure and mail process. Its high level of compatibility with cloud mail and mail servers makes deployment fast and easy. Mail life cycle management can store archived e-mails on the local server, cloud service or other external storage media based on access frequency. If there are hundreds of millions of e-mails, a distributed architecture can be used to process all e-mails, speed up searches and carry out mail browsing and auditing tasks. 
    More Information:https://www.openfind.com.tw/english/downloads/MailBase_EN.pdf

    MetaDefender Email Gateway Security

    OPSWAT

    Deliver trust to your inbox
    MetaDefender Email Gateway Security examines every email and attachment, scanning and addressing malicious content, before it’s delivered. 
    MetaDefender Email Gateway Security evaluates inbound and outbound emails, reconstructs suspicious attachments, and redacts sensitive content—while maintaining consistent email delivery flow. Hyperlinks to unsafe URLs are also replaced with plain text to prevent user misbehavior.

    MetaDefender Kiosk

    OPSWAT

    Trust at the point of entry 
    MetaDefender Kiosk acts as a digital security guard—inspecting all media for malware, vulnerabilities, and sensitive data.
    MetaDefender Kiosk accepts multiple form factors, including CD/DVD, 3.5"" diskettes, flash memory cards, mobile devices, and USBs—even when encrypted.
    Once inserted, MetaDefender Kiosk immediately scans for malware, vulnerabilities, and sensitive data. Suspicious files can be sanitized. Sensitive files can be redacted. MetaDefender Kiosk lets you trust all portable media that enters or exits your facility.

    MetaDefenr Drive

    OPSWAT

    Trust you can hold in your hand
    Any transient device, like a laptop, is a prime target for malicious attacks and infection. 
    MetaDefender Drive is a durable USB drive that creates a portable perimeter, it inspects devices before they enter a facility or its network—even before they boot up.
    Once plugged into a USB port, the computer can be booted safely from Drive, by running off of Drive’s own operating system. This separation allows analysis without software installation — a scan of the entire device for malware, vulnerabilities and a determination of the device’s integrity.

    Alteon

    Radware

    Alteon is Radware’s next-generation application delivery controller (ADC) and the only load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications.
    Alteon load balancer combines best-of-breed application delivery capabilities, market-leading SSL performance that supports all of the latest encryption protocols, and advanced services to companies with ongoing application lifecycle management challenges that impact the performance of web applications (such as heavier, more complex web content); mobility, and the migration to the cloud.
     

    DefensePro

    Radware

    DefensePro provides advanced DDoS prevention, protection and IoT botnet attack mitigation. DefensePro is an award-winning, real-time, perimeter DDoS defense and attack mitigation device, securing organizations against emerging network and applications threats. Part of Radware’s attack mitigation solution, DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques.

    cloud-waf-service

    Radware

    Web application development is becoming increasingly complex and more rapid. DevOps is increasing the level of functionality and frequency of product releases. With application availability more important to the user experience than ever, web applications are becoming increasingly vulnerable, exposing enterprises to the risk of data breach and financial loss.

    cloud-ddos-services

    Radware

    Distributed denial-of-service (DDoS) attacks are becoming more frequent, more powerful and more sophisticated. With the growing availability of attack tools and global botnets, the pool of possible attacks is larger than ever. Relying on humans to block attacks is simply not enough, and organizations dependent on manual-based protection are not fully protected from today’s threats.

    CyberFlood Data Breach Assessment

    思博倫通信股份公司

    CyberFlood Data Breach Assessment is designed to simplify and streamline assessment of security vulnerabilities and provide users with information to harden network security policies. 

    By harnessing an emulation approach and providing continuous, accurate assessment, it enables security teams to find the holes in protections before attackers do. 

    It also provides clarity and confidence in the enterprise’s security posture, and by extracting complexity from data breach assessments it unburdens teams of very time-consuming activities so they can focus on addressing holes in the threat landscape.

    SecurityLabs

    思博倫通信股份公司

    The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. 

    Dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis. 

    Proofpoint

    TACHUN TECHNOLOGIES大鈞科技

    Stop threats before they reach your people and respond quickly when things go wrong. Our innovative solutions prevent, detect, and notify you of advanced threats – through email, mobile, social, and the desktop – and help you resolve them before they cause lasting harm.

    Product Description:
    Threat Protection>> Defend advanced persistent threat and stop malware , credential phishing,at the first moment. Analyze who your Very Attacked People (VAPs) are and draw up a list.

    Information Protection>> Provide recipients reading with attached files.Lock down access to files in the cloud, prevent data loss.

    User Protection>> Educate your people and reduce risk with advanced threat simulations and cyber security awareness training.When browsing personal emails or webpages, you can conduct information security training .

    Ecosystem Protection>> Block imposter attacks and malicious content that uses trusted and lookalike email domains, web domains, and social media handles.
     

    Multi-layer Anti-DDoS Service

    Taiwan Mobile

    TWM’s Multi-layer Anti-DDoS Service is constructed on TWM backbone network. It can block massive DDoS attack data packets. Enterprise clients can deploy DDoS defense without changing their network infrastructures. The service can detect and defense different types of DDoS attacks from layer 3 to layer 7 24x7.

    SOC

    Taiwan Mobile

    Internet attacks vary from time to time. Enterprise now has to face compound internet attacks. Thus, comprehensive information security deployment is future trend. In addition to deploy information security equipment, how to manage the equipment also matters. Once enterprise gets warnings from SOC service, TWM has rich-experienced information security consulting team, which provides consultant service, to help enterprise on finding solutions and giving suggestions. As a result, enterprise doesn’t have to spend a huge cost on training information security professionals. 

    All-in-One UTM

    Taiwan Mobile

    TWM cooperates with Check Point on developing All-in-one UTM solutions. It contains high speed FTTx service and All-in-one UTM. Enterprise can enjoy anti-malware service, spam detection, malicious sites defense, etc. and can pay the fee monthly.

    M+ Messenger for Enterprise

    Taiwan Mobile

    M+ Messenger is an instant communication application for enterprise. It contains enterprise exclusive functions such as instant message, corporate directory, bulletin board, etc. Not only convenience, M+ Messenger is also the safest IM application. It passes ISO27001, ISO27011, and ISO27018 information security certificates. It certainly the best communication tool for enterprise.

    Vulnerability Assessment Service

    Taiwan Mobile

    TWM’s Vulnerability Assessment Service can assist enterprise to find their system and web vulnerabilities, so enterprise can fix the vulnerabilities as soon as possible to prevent attacks.

    Intrusion Prevention System

    Taiwan Mobile

    Intrusion Prevention System can detect and block internet intrusion attacks instantly. By blocking internet attacks like virus, worm, Trojans, and DDoS attacks, Intrusion Prevention System can assist lower the risk of information security.

    CyberFlood Data Breach Assessment

    Terilogy Taiwan

    CyberFlood Data Breach Assessment is designed to simplify and streamline assessment of security vulnerabilities and provide users with information to harden network security policies. 

    By harnessing an emulation approach and providing continuous, accurate assessment, it enables security teams to find the holes in protections before attackers do. 

    It also provides clarity and confidence in the enterprise’s security posture, and by extracting complexity from data breach assessments it unburdens teams of very time-consuming activities so they can focus on addressing holes in the threat landscape.

    Security Labs

    Terilogy Taiwan

    The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization.

    Dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.

    Allot

    Terilogy Taiwan

    Allot states “See, Control, Secure” as its value proposition. 

    Not only provide full visibility on network utilization, application and user behavior, it can also align network performance to business priorities, increase productivity, reduce the attack surface and protect your operations and users against Ransomware, Denial of Service attacks, Bot infection and other web threats.

    momentum

    Terilogy Taiwan

    momentum is like a traffic recorder for the data flow, it can record all of the packets that pass through it. Strengths of momentum are monitoring and security. 

    The current mechanism of it is to collect the traffic data first, and by installing our exclusive Apps, the data can be analyzed, finally made into report, etc. 

    It can be interact with other cyber security products from other brands, and response to customers in real time.

    Identity and Access Management Solution

    WeiCloud Technology

    One Identity Identity and Access Management (IAM) solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. With our solutions, you can enhance your organization’s agility while you address IAM challenges from on-premises, cloud and hybrid environments.

    Privileged Access Management Solution

    WeiCloud Technology

    One Identity Privileged Access Management solutions mitigate security risks and help you achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access to critical organizational data and applications. Our privileged access management solutions enable you to provide the full credential when necessary or limit access with granular delegation for least privileged access. All privileged activity is recorded and all keystrokes are logged with real-time analyzation of activity and data. This eliminates shared credentials and assigns individual accountability to administrator activity with the ability to detect and halt unknown threats immediately. The result is enhanced security and easier compliance with more efficient administration and governance of privileged access.
     

    Active Roles

    WeiCloud Technology

    One Identity Active Roles delivers automated user account and group management that overcomes the shortcomings of native Microsoft Active Directory and Azure Active Directory tools. These enhanced identity-management capabilities enable you to do your job more efficiently, more accurately, and with less manual intervention. Active Roles is designed with a modular architecture, so your organization can easily meet your business requirements today and in the future. With Active Roles, you can automate tedious and error-prone administrative tasks and solve security issues by protecting and controlling all-important administrative access.

    One Identity Safeguard

    WeiCloud Technology

    One Identity Safeguard can reduce the stress and worry with your privileged accounts. This innovative privileged access management solution – available as an easily deployed, hardened appliance – gives your organization a secure way to store, manage, record and analyze privileged access. It is an integrated solution that combines a secured and hardened password safe, and a session-management and -monitoring solution with threat detection and analytics. Safeguard detects and shuts down threats while satisfying your auditors and admins.

    Change Auditor

    WeiCloud Technology

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats to AD and other Microsoft platforms, and can go undetected without protections in place.
    Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.

    Syslog-ng

    WeiCloud Technology

    syslog-ng™ Store Box (SSB) is a high performance, high reliability log management appliance that builds on the strengths of syslog-ng™ Premium Edition. With SSB, you
    can collect and index log data, perform complex searches, secure sensitive information with granular access policies, generate reports to demonstrate compliance, and forward log data to 3rd party analysis tools.

    ArmorX APT - Anti-Malicious Mail Stronghold

    ArmorX

    Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat flows
    An impregnable Email IPS and APT Gateway
    Technological Adavantage
    Sandbox malicious hyperlink download analysis.
    APT attack connection counter Sandbox malware behavior analysis
    Double authentication whitelist.

    Next-gen AI unknown malicious threat program behavior analysis 
    A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including

    • Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.
    • Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.
    • Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.
    • Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.

    Forensic Report
    The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
     

    ArmorX Spam – Spam Mail Control Force

    ArmorX

    Preemptively detect and analyze unknown threat behaviors
    Intercept and quarantine spam mail utilizing dual authentication whitelists

    Technological Adavantage
    Instant traceback tracking of malicious threat communication behavior analysis.
    15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.
    30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.

    Instant traceback tracking of malicious threat communication behavior analysis
    APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
    Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
    Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.

    Proactive analysis of spammer communication behaviors
    Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.
    Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.

    Complete and multi-function organizational reporting
    SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.
    SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.
     

    ArmorX Archive – Mail Archival System

    ArmorX

    ELM based high efficiency index algorithm to effectively and easily conduct full-text search of large data
    OEA enterprise sized cloud archival email system allowing for quick searches
    ELM Massive Data Management
    Supports local and network cluster management.
    Supports Journal SMTP/POP de-duplication archives.
    Supports .eml format (encrypted) storage and multiple restoration methods.
    Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
    More than 50 attachment formats and 10 million emails searched in 5 seconds.
    Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
    OEA supports hierarchical organization development, mail preview, and attachment text quick search.
    OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

    Email Encryption Protection
    The strongest email encryption gateway ever.
    DLP protection and social fraud prevention are the best tools for eliminating fraud.
    PDF/ZIP/HTTPS mail and attachment conditional gateway encryption. 
    Flexible subject marking, compatible with existing systems, attain internal and external control. 
    Custom and random passwords, password database, extensive editing, personal settings.
     

    ArmorX DLP – Mail Audit Unit

    ArmorX

    A data loss prevention framework to protect your confidential trade secrets and invaluable personal information
    Employs personal data masking, drip leak stoppage, and cutting edge encryption technology

    Email remains a vital tool for communications
    between modern business transactions
    Based on corporate secrecy protection and compliance, such as national personal data protection laws (EU GDPR, ISO27001, BS10012, etc.), companies must fulfill and comply with their email filing and auditing Duties.

    Enterprise audits are divided into pre-audits and post-audits
    The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
    The primary purpose of the post-audits are the normal post-management and case-review applications.
    BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.

    Pre-Audit
    excellent risk management tool

    • Legal compliance:pre-configure PII I standard and PII II behavior
    • Accurate:supports regular expression and program verification, custom exclusion
    • Completeness:32/64-bit applications, large and multi-blank attachments
    • Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
    • Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
    • Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
    • Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
    • Management Report:produce various statistical and analytical reports based on audit and management needs

    Post-Audit
    UBA Big Data Behavior Analysis

    • Normal post-audit management:set query conditions, query permissions, and valid period
    • Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
    • Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
    • Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
    • Mail log:display authentication account and source country code/city, supports forwarding and re-sends
    • System log:contains core log, authentication log, antivirus log, load log
    • Security log:record administrator actions, including searches, forwards, and setting changes, etc.
    • Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports
       

    ArmorX Mail - Mail Collaboration

    ArmorX

    An impenetrable and fully secure email system serving as a reliable base for all your communications
    Comprehensive protections that address major weaknesses, unwanted infiltration, hijacking, and viruses

    Impenetrable Security

    •  Core Operation

        Intermediary program list-checking
        shut off useless instructions
        real-time vulnerability protection

    •  Identity Security

        Root PKI/ACL control
        (natural persons) certificate digital signature
        OTP security authentication

    • Static Encryption

        National security grade
        data leak prevention with maximum specification DLE dynamic length encryption

    • Dynamic Encryption

        Third-party or spontaneous certificate encryption
    SSH encrypted connection with zero successful cracks thus far

    Flexible Expansion

    •  Cluster Architecture

        HA Heartbeat automatic backup and reply
        AA SAN cluster anagement
        Rsync parameter synchronization
        DRBD local and Cyrus remote mailbox synchronization

    • High Efficiency Clustering LDAP

        Multi-domain management and advanced routing
        Password policy and online application
        Individual permissions for shared contacts
        AD/LDAP multiple integration
        SQL vacation agent integration

    • Various SOAP (XML) API Interface

    Forceful Innovation

    • Mailbox Service

    POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).

    • Mail Transmission

    Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).

    • Safety Controls

    Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.

    An email, contacts, and calendar app intentionally constructed for zero data loss or synchronization issues
    System controlled app for floating watermarks and PDF attachment watermarks
    Next Generation Cloud Data Center

    • Excessive capacity!

    Virtual mailbox, one mail one file, zero mailbox damage

    • Efficient space conservation!

    Mail deduplication, latest mail ID storage and index management technology

    • Extreme speeds!

    Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage

    • Mobile business!

    Supports ActiveSync compatible standard sync email, contacts, and calendars
     

    ArmorX News – Professional Marketing Newsletter Network

    ArmorX

    EP newsletter – guaranteed delivery
    Specifically designed for superior delivery, opening, and click-through rates

    Effective email marketing
    not only ensures that customers receive messages, but also knows what kind of messages customers like.

    This way marketing professionals can continue to sell their products and improve marketing performance.

    Using the system's unique letter editing mechanism, the general letter content can be converted in to a variety of collection conditions, and various responses can be set in to different points to facilitate analysis and improve email marketing performance.

    • Types of Newsletters

    Can configure the: name; the option to make it as the subscription page; display names on the subscription page (Traditional Chinese, Simplified Chinese, English);
    permission (user, group); notes; whether you need to review, assign a reviewer (supervisor, types of supervisors, other custom classification);
    notification mailbox, notification mail language;
    whether the user can select more, select the upper limit, or cancel the subscription list’s application mode (in accordance with any, in line with all).

    • Mail Delivery

    Supports inline map transfer link, group-send single-recipient display, content variable replacement, online preview, unsubscribe, scheduled delivery, review. Web version of e-newsletter can display community website sharing links, etc. Supports queued mode delivery, number of re-sends, queue re-send time, DKIM/DomainKeys/SPF domain authentication key, outgoing speed, IP name, network card IP binding, etc.

    • Marketing Template

    Source contains the file and the URL. The file format supports
        automatic judgment
        RFC/822 format (.eml)
        MHTML format (.mht, .mhtml)
        HTML format (.htm, .html)
        ZIP format (.zip, including HTML and image files)
    The URL is limited to static web pages;
    JavaScript or complex CSS web content may be distorted.

    • Marketing List

    Includes: marketing list, rejection list, test list; users can delete the marketing list from the system; new list fields contain name contact, permissions, and notes; contacts can add new, edit, delete, import, and download template; import formats supported are the .csv format and .txt format; data column symbol supports commas, semicolons, and tabs; fields include mailboxes, display names, company names, titles, and etc.

    • Scheduling Management

    Query field includes: period (last N day/week/month, from year/month/day to year/month/day), user, subject, audit account, audit result (all, pending reviews, permissions, prohibited); supports comparison methods (partial comparison, full comparison, left-to-left comparison, right-to-right comparison), whether to display “has been deleted.”
    The list field contains: the time the letter was sent, the sender, subject, user, auditing supervisor, final decision-maker, audit result, audit opinion, audit time, and delivery status. Delivery status includes: re-editing, test sending, delivery initiation, submit for review, review (whether to agree, review opinion), and deleted.

    • Statistic Reports

    Query field contains: period (last N day/week/month, period), user (user, group), and newsletter type. List field contains: the user, number of transmissions, number of mailboxes, number of successes, number of failures, number of opened messages, number of clicks, success rate, and failure rate.

    • System Features

    Supports custom text and graphical RWD for unsubscribtion Can perform secondary marketing for query results Define recipient behavior scores for profit analysis Integrate APIs with third-party systems Synchronize with CRM Synchronize logs with CRM

    • Marketing Log

    Query field contains: the period (last N day/week/month, period), sender, subject; support comparison method (partial comparison, full comparison, left-to-left comparison, right-right comparison). List field includes: marketing activities, subject, number of mailboxes, unsubscribe rate, failure rate, success rate, open rate, click rate, subscription rate. Marketing activity information includes: marketing activities, newsletter type, account number, event time, subject matter, sender, system list, rejection list, other recipients, unsubscribe, total number of recipients, scheduled delivery, and message code. Delivery log display fields include: recipient, sent date, DSN code, delivery result. Query conditions include: support list screening, recipient, filter by delivery results (all, success, failure, queue), opened letters (all, open, unopened), clicked (all, clicked, unclicked).
     

    ATKey.Pro

    AuthenTrend

    Fingerprint enabled USB dongle for identity and authentications via FIDO, OTP or other protocols; 

    FIDO2 certificate, Validated by MISA(Microsoft Intelligent Security Associations) for Azure Active Directory Passwordless login;
     

    ATKey.Card

    AuthenTrend

    Fingerprint enabled smart badge, built-in NFC, BLE and USB for authentication(FIDO or OTP), and access control(NFC), plus location tracking(BLE).

    FIDO2 certificate, Validated by MISA(Microsoft Intelligent Security Associations) for Azure Active Directory Passwordless login;

    AT.Wallet

    AuthenTrend

    Fingerprint enabled card type blockchain Cold Wallet.

    Design by EAL 5+ SE + fingerprint sensor + E-ink to support USB, BLE interface, plus unique Standalone mode for secure cryptocurrency transactions;

    CES 2020 Innovation Award Honoree - Cybersecurity and Personal Privacy

    Billows OneMan SOC

    Billows

    Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT is collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery and etc…Providing relevant SIEM's  correlation rules and characteristics of the latest information security attacks. Furthermore, our platform combined with AI analysis module of for the efficiency and accuracy of detecting malicious behavior.

    In addition to continuous internal monitoring and improving the credibility of incidents, our platform provides automatic updates or manually update correlation rules. Allowing tech administrators to find and solve the problems immediately, improving the internal monitoring in a timely manner. 

    Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is new malicious IP / URL information, we can block it automatically through our proactive defense system . When emergency incident needs to be reported and handled immediately , You’ll be notified by our security notification and it’ll be handle accordingly through our forensics analysis. Our OneMan SOC platform assists in the entire 
    process management workflow: from generating notification forms to completing the entirety of each case. Helping customers to secure their internal monitoring.

    Billows LogMaster

    Billows

    This platform allows collecting, compressing and saving large volumes of raw logs. It 
    also allows for integration with other reporting software to maximize visibility and 
    allow effective visualization of internal information. Additionally, users can also 
    automatically forward security logs to their threat analysis platform based on their 
    custom cyber security analysis needs. LogMaster offers the following capabilities.
    Log Storage: collecting and normalizing logs while performing long-term log 
    storage and non-repudiation verification
    Threat analysis: Integrating analysis within inbuilt threat modules so as to detect 
    abnormal events
    Packet storage: automatically saving packets when a specific security incident 
    occurs, preserving the integrity of digital forensics
    Quick response: provisioning of an automated response mechanism that 
    effectively shortens response time and automatically generates the required event 
    messages, simplifying and shortening incident response steps.

    Billows ISAC Information Security Incident Notification System

    Billows

    In accordance with the requirements for reporting security incidents of the Cyber Security Management Act, when a security incident occurs, it must be reported to a higher-level unit. Therefore, thru this platform to receive incidents information and verify whether the incident needs to be reported. From generating the specific report format to comply with the standard procedure automatically, to process and complete the entirety of each case in accordance of the National Center for Cyber Security Technology’s standardized format. Enhancing the immediacy, correctness and integrity of information, while instant sharing the incident information in helping to secure and reinforce the overall response.

    ChkSender: E-Mail Preservation and Authenticity Verification

    BlockChain Security

    ChkSender is a browser extension that is easy to install and use, not interfering with user's normal usage habits. It, in essence, enables users to confirm email authenticity by verifying email’s hash value, and to validate email integrity by verifying sender's domain information.

    When transmitting crucial emails, email is both saved & sent out via a one-click action; its digital fingerprint is, thus, permanently stored on blockchain and its timestamp is recorded. For confidential content protection, email can first be encrypted by assigning it a password, before being sent out. As a result, In case of any future disputes such as remittance transfer issues, the stored evidence can be used in court aiding with legal defense.

    Received email is verified in one click, confirming email authenticity, including if the subject, sender, recipient, mail body & attachment file names match the original. If already encrypted, received ChkSender logo can be clicked to decrypt and view the original email details. In case of sender's email address being tampered with, the difference with the original sent-email is clearly shown, duly preventing falling victim to hackers. In addition, sender’s domain information such as domain registration information, domain website screenshot, etc., are displayed assuring the receiver of the sender's origin. User may then add relevant sender's email address or domain name into personal whitelist/blacklist, used for easy future identification.

    ID Expert Identity Authentication System

    CHANGING

    ID Expert is the authentication solution protects users' accounts from hacking. The dynamic verification with various tokens, such like finger print or One-Time Password that fulfill secured and safe access. 

    uSAFE Flash Drive Management System

    CHANGING

    uSAFE is a Flash Drive Management System innovated for enterprise. The internal scenario is secured by allowing only authorized Flash Drive and computers to read and write the files. Through smart and convenient setting, the system will generate unique “Secured Flash Drives” to avoid from uncertain files or programs being written to drives. The solution will efficiently keep the computes from virus invasion. Files in the drive are protected if the flash drive is missing because only authorized computer can read files to prevent malicious usage. uSAFE secures enterprise’s internal scenario, strengthens data security and be on a strict check of data sharing procedure.

    CYBAVO VAULT

    CYBAVO

    CYBAVO VAULT is a cryptocurrency storage and wallet management system designed to fulfill business accounts requirements, providing at the same time a top notch protection level to secure your digital assets. Our digital wallet manager and vault provides business owners and digital asset managers the ideal tool to manage multi-currency wallets, and to perform streamlined blockchain transactions in a secure way.

    CYBAVO Wallet App SDK

    CYBAVO

    CYBAVO Wallet App SDK allows your company to easily develop your own mobile cryptocurrency wallet to offer to your customers, secured with CYBAVO private key protection technology.

    CYBAVO Ledger Service

    CYBAVO

    CYBAVO Full Node Ledger Service offers secure Full Node service for enterprise cryptocurrency applications, providing a highly available and resilient solution. Our solution allows to quickly on-board new currencies and to reduce drastically the operating costs of having a Full Node.

    CyCarrier AIR Platform

    Cycarrier

    Flexibly deploy from on-prem or the cloud, AIR inspects thousands of endpoints simultaneously, detects real-time threats, discovers the root cause, and instantly responds. Our Xensor agent-less mode scans the endpoints on a daily scheduled basis, while the agent mode constantly monitors the endpoints for any malicious activities.

    The collected raw report from Xensor is sent to CyCarrier (AI-powered forensic analytics center), where it investigates malware samples, commands in memory, and other suspicious activities that signatures-based or anti-virus fail to classify. To enrich the CyCarrier’s database, the Cybertotal (Threat Intelligence) platform integrates internal sources with updated multiple external CTI data sources to provide the unique business intelligence.

    Red Team Assessment

    DEVCORE

    Red team assessment is a process of using advanced tactics, techniques, and procedures to emulate a real-world threat to train and measure the effectiveness of process and technology used to defend an environment in a limited time period. Typically conducted by a third-party organization. We own the hacker's mindset and use world-class attack techniques to accurately identify the blind spots of corporates security defense. More often, corporates can also take stock of the accuracy and coverage of the security monitoring mechanism to make sure these controls are still effective. And experience a real-world attack in a safe way, instead of learning from real-world incidents to enforce internal consensus and awareness. 

    GenieATM

    Genie Networks

    GenieATM
    an advanced network traffic mining system to provide decision support on network service operation, network security reinforcement on locating problems instantly, powerful traffic analysis with flexibility, and various traffic statistics reports.

    GenieAnalytics Product Suite

    Genie Networks

    GenieAnalytics Product Suite
    A highly flexible and scalable big data platform for network traffic and security analytics, providing immediate network operational insights for carriers, ISPs, and enterprises with large networks through powerful big data analytic ability, OTT service and CDN tracking and rich data visualizations.

    ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability)

    Global Wisdom

    ANCHOR(Ark of Network, Cyber Hamper for Operations Reliability) starts with the spirit of ISO and best practice experience. Each management link in the privileged account lifecycle (certification, application, review, activation, notification, connection, monitoring, reporting, auditing) corresponds to the managing process and auditing requirements and other functions that constitute a centralized managing platform to save the traditional high cost of implement and time costs.
    This product uses single portal to complete the privileged account lifecycle management, includes controlled device/group authorization management, temporary ID/connection/password application, audit, auto sign-in, live monitoring, playback, reporting and audit workflow. To exempt unnecessary risks and avoid maintenance disputes, the controlled-device does not need to be installed any software or opened catalogue (Agent-less). It is a solution with best security, best convenience, best initiative, best immediacy, best importability and best usability.

    eDetector

    iForensics

    eDectector is a practical and powerful remote malware-scanning and detecting tool. It detects the behavior of processes and assists users to find out and mark the malwares, even the unknown ones. With this function, you would never be helpless against APT attacks. Besides, eDetector can assist to build an Intranet Security Alarm System, which makes it possible to find the hiding zombie computers earlier. We could hence take the necessary actions against attacks in the shortest time, avoiding the enlarged tragedy of the information security issues.

    Sekret - iOS

    InfoBoom

    Sekret is an end-to-end secure instant messaging app in favor of user privacy protection. The encryption/decryption procedures are performed in the device side whereas server-side can't perceive any piece of plain information transmitted between or among users. All message types, including text, audio, image, video, location, contact, file, and realtime audio/video streaming data, are all preservable with strict and rigorous end-to-end operations that conduct the best information secrecy.

    Sekret - Android

    InfoBoom

    Sekret is an end-to-end secure instant messaging app in favor of user privacy protection. The encryption/decryption procedures are performed in the device side whereas server-side can't perceive any piece of plain information transmitted between or among users. All message types, including text, audio, image, video, location, contact, file, and realtime audio/video streaming data, are all preservable with strict and rigorous end-to-end operations that conduct the best information secrecy.

    KX906 Smart Token

    KeyXentic

    The fingerprint biometrics are used to replace the password to solve the current security risks caused by the account password mechanism. Users can manage the encryption keys, credentials and personal biometrics through their fingerprints.
    And applied to various credible service processing such as file encryption, digital signature or blockchain and other related applications. Achieve the use of personally controllable digital keys to create a secure network environment.

    InstantCheck® Cloud Security Gateway

    L7 Networks

    ■ Filtering Threats Inside https
    Nowadays cloud services and hacker C&C are all encrypted in https connections, causing traditional security solutions fail to filter the contents. Such services include Hacker Cloud (Botnet C&C / APT), WebMail Cloud (Gmail / Outlook / Yahoo Mail), Social Cloud (Facebook / Twitter / Google Plus), WebHD Cloud (Dropbox / Google Drive / One Drive), Messenger Cloud (Line / Skype / Google Hangout / Facebook Chat). Research reports indicate that at least 60% of the total traffic hides in https tunnels. Auditing, filtering, and forensics the content of traffic is not easy anymore. It’s time to face the truth.

    ■ Ransonware & Confidential Data Leakage
    Recently many computers are locked by ransomware, meaning anti-virus is not fast enough to defend vulnerabilities. Stopping botnet’s command and control return path with malware sandbox are the last defend line for enterprises. InstantCheck® has integrated Google Safe Browsing® malicious website database, Malware Patrol® ransonware C&C prediction, NICST blacklists. Moreover, decrypted malicious files can be sent to InstantTrace® sandbox cloud for further analysis. 

    ■ Regulatory Compliance
    Corporate scandals and breakdowns such as the Enron case have increased calls for stronger compliance and regulations in different kinds of industries, such as Sarbanes–Oxley, ISO27000, PCI-DSS, HIPAA, SEC, FINRA, FSA, IIROC, FERC, NERC, CFTC, NFA. They all require electronic communications to be logged for years for auditing. Of course, it is a must to audit https traffic since most crime activities hide themselves in encrypted https tunnels. 

    ■ User-Unaware Installation and Digital Forensics
    User-unaware installation is extremely important for such auditing tools. InstantCheck® employs transparent mode or proxy mode to install without changing your network architecture. Currently InstantCheck® can filter detailed behaviors and reconstruct mainstream webmail contents (Gmail / Outlook / YahooMail ) webhd contents (Dropbox / One Drive / Google Drive), messenger contents (Line / WeChat / Facebook Chat / Gmail Chat), social contents (Facebook / Twitter) for network data forensics.

    ■ Professional Apps For Further Analysis
    After SSL decryption, InstantCheck® can call the following apps:
    (1) Built-in AegisLab® virus signatures who has been listed in VirusTotal® since 2013
    (2) Built-in Google Safe Browsing® service for blocking malicious malware URL/IP
    (3) Built-in Malware Patrol® ransomware C&C domain prediction engine
    (4) Built-in IP/URL blacklists from FireHOL®, Cisco Talos®, NICST®, AegisLab®, ...
    (5) Optional InstantAudit® End-Point for audting messages / files of Line/Skype/WeChat
    (6) Optional InstantLock® DLP engine for recognizing privacy / confidential data / intellectual properties
    (7) Optional InstantTrace® malware analysis for sandboxing unknown threats
     

    AS-Advanced Crypto lab

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTU-AI & Data Science

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTUST-IoT-based End-to-End System Security

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCTU-Cutting-Edge Technologies for Malware Vetting, Network Attack & Defense

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTHU-Cyber security in finance and financial software security

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCHU-Resilient and Privacy-Preserving Mechanism for Critical Information Infrastructures

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCKU-Security Operation Center & ISMS Technology Development

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NSYSU-Secure and Intelligent Next-Generation Communications and Computation Technologies

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCHC-Multilayer Cybersecurity Defense Service and System Development

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    HERCULES SecDevice

    Onward Security

    HERCULES SecDevice is a security assessment tool designed for connected products that provides automated features to save time and man power during testing. 
    Function Feature:  
    1. Automatic target identification and testing 
    2. Intelligent analysis of vulnerabilities 
    3. Fuzzing test to find unknown vulnerabilities
    4. Supports known vulnerability test cases 
    5. Detailed test result reports 
    Supporting Devices: 
    1. Embedded Devices 
    2. IoT Devices 
    3. ICS/SCADA/IED/PLC Devices 
    4. Other, support operated on Ethernet/IP Device
     

    HERCULES SecFlow

    Onward Security

    HERCULES SecFlow assists users to manage software security development life cycle (SSDLC) related tasks and provides functions such as "security development process management", "security vulnerability database" and "active product security event monitoring". During the requirements, design, development, testing, deployment and maintenance stages, HERCULES SecFlow can be used to meet the requirements of the SSDLC and further to comply with compliance standards such as ISO 27001, ISO 27034, NIST SP 800-64 and IEC 62443.
     

    Openfind Secure Cloud Service

    Openfind

    OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency. 

    MailGates Mail Protection System

    Openfind

    The MailGates mail protection system is deployed in front of corporate mail servers. To provide users with comprehensive anti-spam protection, global and local samples are analyzed on the mail cloud to identify all e-mail attack behaviors and threats, provide real-time anti-virus protection, as well as automatic detection and filtering of spam.
    The reliable and high-performance system environment, clear and succinct statistics reports and logs, as well as comprehensive and user-friendly administration functions with industrial-level mail management requirements. The MailGates mail protection system will continue to refine its mail protection functions and build the most secure, smooth and reliable channel for e-mail delivery and receiving.
    More Information:https://www.openfind.com.tw/english/downloads/MailGates_EN.pdf

    Mail Archive and Management System

    Openfind

    MailBase Replication Mode makes the archiving of e-mails easy and requires absolutely no changes to the existing network structure and mail process. Its high level of compatibility with cloud mail and mail servers makes deployment fast and easy. Mail life cycle management can store archived e-mails on the local server, cloud service or other external storage media based on access frequency. If there are hundreds of millions of e-mails, a distributed architecture can be used to process all e-mails, speed up searches and carry out mail browsing and auditing tasks. 
    More Information:https://www.openfind.com.tw/english/downloads/MailBase_EN.pdf

    RUITING RKMS Key Management System 2.0

    Ruitingtech

  • Type:Encryption
  • Sol-DISC Integrated Digital Intelligence Platform

    SWT Solutions Inc.

    "One-Stop-Shop" platform for digital Investigation that allows you to discover unexpected personal connections, similarity  between individual cases, and correlations among seemingly unrelated individuals and cases.

    Big Data hidden in overwhelming numbers of devices will need not just one but many tools for discovery and analysis. In order to uncover evidence, acquire critical information, or investigate inside an organization, a "Toolbox" approach with multiple digital forensics tools is essential. However, this approach inadvertently presents a challenge: How do you examine different reports from a variety of forensics tools at the same time? How do you discover insights and correlations out of the mass amount of data?

    Sol-DISC Integrated Digital Intelligence Platform

    SWT Solutions Inc.

    Enter Sol-DISC.

    Sol-DISC was created by SWT Solutions to solve this challenge. It integrates multiple forensics reports on one platform for review and analysis. Information is structured into case management and POI management categories for cross examinations among individuals and cases in order for actionable insight discovery.

    QUARK Android-An Obfuscation-Neglect Android Malware Scoring System

    Telecom Technology Center

    Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.

    We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.

    According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. Certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.

    Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.

    Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.

    Gateway Solution Service

    TRADE-VAN

    Our “Gateway Solution Service” provides domestic and foreign cyber security information, blacklists, websites, various Trojans and viruses, and real-time blocking, as well as 24/7 monitoring and threat warning and 24-hour professional customer service consulting services. We use a monthly rent model, so SMEs can easily have national-level security protection.

    TrustView Full-Scale Data Protection Solution

    TrustView

    We adopt the exclusive patented technology of DRM/Area DLP/CASB to provide a full-scale data protection solution for endpoint, file server, web application and cloud environment. This helps directly protect a variety of important files, pictures, web content and source coded. The most brilliant part of the TrustView solution is the three-tier file protection design. The company can introduce a solution on its own to meet its special requirements and create most suitable data security for the operation.

    TWISC Research Centers

    TWISC

    TWISC has established seven affiliated regional centers respectively across Taiwan since then with the headquarters (TWISC@AS) established within and funded by the Research Center of Information Technology Innovation, Academia Sinica. The research activities in TWISC include cryptology, network & software security, data protection, and critical information infrastructure protection, etc..

    International Collaborations

    TWISC

    Coordinate international cooperation planning, including relevant security research units in the United States, Germany, Japan, and Israel.

    Education

    TWISC

    Assisted seven affiliated regional centers to handle seed training and education promotion.

    Projects

    TWISC

    For emerging technologies, explore security threats and issues that have occurred or may be derived in the future.

    AgileLink-Wan load balance

    UGuard

    UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
    By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

    UAC-Unified Access Controller

    UGuard

    Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides  extensive monitoring reports for daily operations.
    No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.

    UPAS Intranet Security Management

    UPAS

    UPAS Intranet Security Management is an IP management and network access control system which can block unauthorized devices connecting to intranet to ensure the network security.  It has 15 modules which mainly provide 6 core functions, includeing IP/MAC management, AD management, BYOD/Visitor management, devices management, deivces compliance check and events data analysis. It can block those devices which are not allowed or non-compliant to connect into intranet to make sure the safty of enterprises. And also lower the tasks loading of MIS by automatic managing abilities.

    UPAS Intranet Security Management is easy to install and doesn’t need to change any network devices. (No need to support 802.1X and SNMP protocols), without security vulnerability (No need to create an port exception to avoid security vulnerabilities), easy to set up (No need to set up every port), malfunction bypass (such as if UPAS device crashed,  it will not cause any trouble to current environment ), patented technology (less packet and  light network loading ).UPAS emphasizes automated management (reduce  the burden of manual work).

  • Type:NAC
  • Penetration Testing

    Zuso

    In the aspects of hackers, we attempt to invade a corporate's website and information system, from exterior to interior, in purpose of doxing the possibility of potential threats for issuance of complete report and advice of improvement.

    Red Team

    Zuso

    Our red team use zero-day vulnerabilities into  potential attack paths, business impact of the breach, remediation steps and analysis to understand root causes of security failures.

    Cyber Security Incident

    Zuso

    Cyber Security Incident
    Cyber Attacks Anywhere Are a Threat Everywhere.Our team has a lot of experience in investigating security incidents, allowing companies to quickly understand the overall incident, All to help you get back to business as usual with confidence- quickly and efficiently.

    Data Science

    Zuso

    A sure way to victory is to know both your strength and the enemy's. " We exploit an unique technique for analyses, spot your most desirable outcome and render you the most concrete recommendation.

    Consultation Service

    Zuso

    The thinking pattern of a singular aspect is out in terms of information security and data analyses. Multiple perspectives ace! With sincerity, we provide you the panorama of circumnavigation-wide visions and assist your corporate in advancing to better prosperity.

    CyCarrier AIR Platform

    Cycarrier

    Flexibly deploy from on-prem or the cloud, AIR inspects thousands of endpoints simultaneously, detects real-time threats, discovers the root cause, and instantly responds. Our Xensor agent-less mode scans the endpoints on a daily scheduled basis, while the agent mode constantly monitors the endpoints for any malicious activities.

    The collected raw report from Xensor is sent to CyCarrier (AI-powered forensic analytics center), where it investigates malware samples, commands in memory, and other suspicious activities that signatures-based or anti-virus fail to classify. To enrich the CyCarrier’s database, the Cybertotal (Threat Intelligence) platform integrates internal sources with updated multiple external CTI data sources to provide the unique business intelligence.

    GenieATM

    Genie-networks

    GenieATM
    an advanced network traffic mining system to provide decision support on network service operation, network security reinforcement on locating problems instantly, powerful traffic analysis with flexibility, and various traffic statistics reports.

    GenieAnalytics Product Suite

    Genie-networks

    GenieAnalytics Product Suite
    A highly flexible and scalable big data platform for network traffic and security analytics, providing immediate network operational insights for carriers, ISPs, and enterprises with large networks through powerful big data analytic ability, OTT service and CDN tracking and rich data visualizations.

    Acronis Cyber Backup

    Acronis

    Businesses can be at risk of losing important data. Lost data leads to costly downtime, customer dissatisfaction, regulatory fines, and lost revenue. As a result, IT pros must meet extremely high expectations. You need to keep the company running 24-hours a day.

    Acronis Backup delivers the data protection that meets today’s demands. It keeps your business running, protecting any workload, scaling without limits, and saving you money.

    Acronis Backup keeps your business operations running by ensuring your data is always available. AI- and ML-based technologies proactively defend data against ransomware attacks, and with near-instant recoveries, you’ll meet even the shortest RTO, avoid operational outages, loss of productivity and costly downtime caused by infections and recovery efforts.

    Acronis Backup reliably protects any data source on 21 platforms - virtual, physical, cloud and mobile, regardless of the size or location of the data. As your data needs grow or your infrastructure evolves, keeping company data secure is easy with flexible, scalable storage and simple backup administration.

    Increase overall performance of your production systems and avoid unnecessary disruptions while moving to another system. Improve recovery point objectives (RPO) with the ability to run frequent backups. Instantly protect your systems with the simplest install process possible.

    Allot

    Allot

    Allot is a leading provider of innovative network intelligence and security solutions that empower communications service providers (CSPs) and enterprises worldwide to enhance the value they bring to their customers. With over 20 years of proven success, our solutions turn network, application, usage and security data into actionable intelligence that make our customers’ networks smarter and their users more secure.

    Allot network-based visibility, control and security solutions are deployed globally by the world’s leading service providers and enterprises to improve network performance, ensure optimal QoE and deliver value added security services. Our leading network security solutions achieve unmatched results.

    See. Control. Secure.
    Your network and your customers are your assets. With Allot Intelligence, Control and Security at the heart of your network, you gain the visibility and power needed to improve business decisions, target customers better, and protect any device connected to your network right from within. With Allot you can truly be much more than just a network.
     

    Cellopoint Secure Email Gateway (SEG)

    Cellopoint

    Cellopoint Secure Email Gateway (SEG) is an integrated email security gateway solution deployed in front of the Mail Server. It uses the original CelloOS technology and the industry-leading CelloCloud, a Cloud online security system, with a multi-layer scanning mechanism to effectively block the threats of Advanced Malware、Ransomware、Businese Email Compromise、Spam、Virus、Phishing Emails、Spyware、Mail Bombs, and Springboard attacks from entering your network and protecting the email security infrastructure, while improving the performance of the mail server.

    Email Data Loss Prevention(DLP) for auditing and encryption

    Cellopoint

    Cellopoint mail policy engine can pre-establish DLP detection conditions and execution actions of enterprise organization's outbound mail, in order to detect and protect personal information、business secrets and company intellectual property. Outbound mail encryption provides PDF which is easy to use,  HTTPs encryption, and S/MIME encryption that emphasizes strict protection, both practical, convenient and also for highly sensitive information protection. Email encryption is no longer a high-tech technology, which providing organizations with flexible planning of email security.

    CTI Cellopoint Threat Intellgence Service

    Cellopoint

    Cellopoint provide Sender IP reputation lists、the latest malicious email with malware MD5 or fingerprint、new url malicious database and phishing emails patterns through customize service.

    EyeLAN

    Chunghwa System Intergration

    Combined with SDN switches, it provides functions such as centralized management, flexible settings, and rapid obstacle detection. EyeLAN controller's single management interface enables centralized management of SDN network equipment,Networks can be flexibly installed on demand,Quickly find path obstacles and remove obstacles with obstacle detection,Can also control the network permissions and time of terminal devices and IoT devices,If the terminal device detects the MAC information of other terminals, it can effectively prevent the terminal that illegally steals IP / MAC from attacking.

  • Type:NAC
  • Citrix Workspace

    Citrix

    Citrix Workspace is a flexible platform that delivers a personalized, digital work experience. Simplify complex enterprise applications by streamlining functionality and provide a single point of access to content, managed, web, SaaS, Windows and Linux apps and desktops.
    Only Citrix has the unique ability to securely deliver at every layer of your technology stack. We provide industry-leading solutions for endpoint management, content collaboration, access control, virtual apps and desktops, workspace intelligence and analytics so IT has end-to-end visibility and control.

    Cubro EXA8

    Cubro Network Visibility

    A FLEXIBLE HARDWARE PLATFORM FOR ENDLESS NETWORK APPLICATIONS
    Enterprises need a more intelligent network security and monitoring approach which provides granular visibility down to the link layer. The EXA8 is the first packaged hardware and software solution in the market that addresses the needs of enterprise customers and network engineers for a fail-safe network tapping, traffic capture, and troubleshooting platform.

    It is possible to manage the EXA8 not only remotely but wirelessly with the addition of 4G or Satellite modems. Given the small, portable form factor, low power consumption, and economical cost of the EXA8, it becomes a very compelling option for remote and distributed deployments.

    Cubro PACKETMASTER EX32/32+

    Cubro Network Visibility

    The EX32 series Network Packet Broker is a cost-effective solution for high port density 10G networks and offers expanded features over the previous Packetmasters such as packet slicing and user-defined filters.

    The EX32 features 32 x 1 or 10G SFP+ interfaces offering exceptional port density and features at a very compelling price point. The EX32+ model also adds an additional 2 x 40G QSFP ports. These QSFP ports also support breakout cables to individual 4 x 1/10G connections bringing the 1/10G link capacity up to a possible 40 x 1/10G interfaces.

     

    Cubro SESSIONMASTER EXA24160

    Cubro Network Visibility

    The EXA24160 is a next-generation network packet broker capable of filtering up to OSI Layer 7. The EXA24160 is capable of advanced functionality such as deduplication, time-stamping, and session-based filtering on a keyword (search the payload of a packet for specific keyword match) or regular expression matching (search the payload for a pattern match). This is accomplished by a pair of powerful x86 processors that handle L5-7 filtering.

     

    Cubro AGG-32100

    Cubro Network Visibility

    The AGG-32100 series Network Packet Broker is a cutting edge solution for environments with high densities of 100G links. The AGG-32100 is part of the Fifth Generation (G5) network packet brokers from Cubro. The architecture in these devices is a programmable switching fabric that offers unparalleled performance and throughput for extremely high-bandwidth installations.

    The AGG-32100 features 32 x 40/100G QSFP/QSFP28 interfaces and also supports 10G/25G coverage via breakout cables providing an extensive and flexible level of connectivity.

     

    CyberArk

    Cyberview

    Since CyberArk established in 1999, we have been focused on assisting customers organizing high-level account security management, to provide all-round solution to internal arrangement, cloud, and ICS environment. Not only provides extensive support to applications and devices at business level, including important server, AP and DB system and internet security, but also released Endpoint Privilege Manager(EPM), a control system integrating "highest authorized account of local machine" and "application programs", protecting the security of window machine(PC, NB, Macbook) and Windows Server, providing an effective "cyber security protection" system to the overall environment.

    CyberArk Core PAS – Privileged Access Security Solution includes the following characteristics:
    . According to organizational privileged access security principles, focus on protection and control of access right on privileged password
    . Able to view privileged user’s connection real time, can remotely end all suspicious connections.
    . Saves complete record of privileged connection, make it easier for the auditor
    . Automatic identification, warns of irregular activities

    Endpoint Privilege Manager (EPM) includes the following characteristics:
    . Self-learning/ establishes policy according to business needs
    . Minimal exquisite privileged principles enforced on Windows system manager
    . May raise user authority according to business needs
    . Identifies and blocks malware application software promptly
    . Detects and blocks behaviors trying to steal authentication
    . Unknow application software are to be executed safely in restricted mode
    . Integrates with threat detection tool, to analyze unknown application programs
    . To find all application programs in the environment

    《2018/Nov Gartner Magic Quadrant for Privileged Access Management》

    Allot

    Envinex

    Allot is a leading provider of innovative network intelligence and security solutions that empower communications service providers (CSPs) and enterprises worldwide to enhance the value they bring to their customers. With over 20 years of proven success, our solutions turn network, application, usage and security data into actionable intelligence that make our customers’ networks smarter and their users more secure.

    Allot network-based visibility, control and security solutions are deployed globally by the world’s leading service providers and enterprises to improve network performance, ensure optimal QoE and deliver value added security services. Our leading network security solutions achieve unmatched results.

    See. Control. Secure.
    Your network and your customers are your assets. With Allot Intelligence, Control and Security at the heart of your network, you gain the visibility and power needed to improve business decisions, target customers better, and protect any device connected to your network right from within. With Allot you can truly be much more than just a network.

    Xena

    Envinex

    Xena SAFIRE

    Enterprise Firewall Performance Tester

    Enterprise firewalls improve network security by segmenting corporate LANs. However, each of the advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) has a performance penalty. Combined, these features can seriously reduce network performance (in some instance up to 90%) – frustrating users and reducing business performance.

    Safire is the only solution on the market that solves this problem quickly and cost-effectively.

    TECHNOLOGIES:  Network Security

    USED BY:
    Enterprise IT
    Network Security
    System Integrators
    Data Centers
    Finance
    Government
    Defense

    Cubro EXA8

    Envinex

    A FLEXIBLE HARDWARE PLATFORM FOR ENDLESS NETWORK APPLICATIONS
    Enterprises need a more intelligent network security and monitoring approach which provides granular visibility down to the link layer. The EXA8 is the first packaged hardware and software solution in the market that addresses the needs of enterprise customers and network engineers for a fail-safe network tapping, traffic capture, and troubleshooting platform.

    It is possible to manage the EXA8 not only remotely but wirelessly with the addition of 4G or Satellite modems. Given the small, portable form factor, low power consumption, and economical cost of the EXA8, it becomes a very compelling option for remote and distributed deployments.

    Cubro PACKETMASTER EX32/32+

    Envinex

    The EX32 series Network Packet Broker is a cost-effective solution for high port density 10G networks and offers expanded features over the previous Packetmasters such as packet slicing and user-defined filters.

    The EX32 features 32 x 1 or 10G SFP+ interfaces offering exceptional port density and features at a very compelling price point. The EX32+ model also adds an additional 2 x 40G QSFP ports. These QSFP ports also support breakout cables to individual 4 x 1/10G connections bringing the 1/10G link capacity up to a possible 40 x 1/10G interfaces.

     

    Cubro SESSIONMASTER EXA24160

    Envinex

    The EXA24160 is a next-generation network packet broker capable of filtering up to OSI Layer 7. The EXA24160 is capable of advanced functionality such as deduplication, time-stamping, and session-based filtering on a keyword (search the payload of a packet for specific keyword match) or regular expression matching (search the payload for a pattern match). This is accomplished by a pair of powerful x86 processors that handle L5-7 filtering.

     

    Cubro AGG-32100

    Envinex

    The AGG-32100 series Network Packet Broker is a cutting edge solution for environments with high densities of 100G links. The AGG-32100 is part of the Fifth Generation (G5) network packet brokers from Cubro. The architecture in these devices is a programmable switching fabric that offers unparalleled performance and throughput for extremely high-bandwidth installations.

    The AGG-32100 features 32 x 40/100G QSFP/QSFP28 interfaces and also supports 10G/25G coverage via breakout cables providing an extensive and flexible level of connectivity.

     

    FINIKA

    EQIT

    A platform to integrate network data residing in different sources and provide real-time network status, access control and end-point security.

    SYNESIS

    EQIT

    SYNESIS Portable provides mobility for big data packet capture needs without sacrificing high fidelity lossless packet capture performance at any Ethernet speed: 1G/10G/100G. The rugged SYNESIS Portables are ideal for lab, offsite locations, and data centers as temporary big data packet collectors. SYNESIS Portables are self-contained units with their own monitor, keyboard, and mouse trackpad and all of the necessary software.
    The rackmount SYNESIS, with its higher performance and larger storage capacity, is designed to monitor critical links for long-term forensic needs.
     

    Uila

    EQIT

    Enterprise Data center architecture has evolved dramatically in recent years, enabling it to e¬ectively run large-scale, distributed, multi-tier applications across public, private and hybrid cloud environments. To support and ultimately ensure delivery of business-critical applications and services, an elastic data center architecture and agile development model has emerged to share workloads, data and resources across the multi-cloud environment. However, IT monitoring solutions have not kept pace with this new wave of multi-cloud dynamics and the agile DevOps model. Current tools have reinforced the established silos that separate applications, virtual infrastructure, physical infrastructure and blind to public cloud resources. As a result, IT Ops teams have no inter-silo correlation across clouds and are unable to e ciently plan, migrate, optimize, right-size and solve problem on hand. There is also a lack of a single console across the multiple cloud providers and on-premise deployments for ubiquitous visibility for the workload and its dependencies. 
    Uila solution aligns business applications and IT Operations in a single product with application visibility and correlated network, compute and storage insights across clouds boundaries.
     

    F-Secure Business Suite

    F-Secure

    Scalable on-site business security for organizations of all sizes 
    Designed to simplify the demanding security needs of today's organizations

    F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

    • Layered protection to protect your assets from gateway to endpoint
    • Best protection levels covering both known vulnerabilities and new, emerging threats
    • Advanced management features to allow you full control of your organization's IT security
    • Less work through automation of daily tasks
    • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes

    F‑Secure TOTAL

    F-Secure

    Premium cyber security for you and your devices

    What does F-Secure TOTAL include?

    • SAFE internet security

    The world's best antivirus, brought to you by 30 years of cyber security experience. Includes family rules to let you limit children's device use. 

    • FREEDOME VPN

    The privacy app which received special mention in an independent comparison of over 300 competitors. Make your devices invisible online.

    • KEY password manager

    A light and easy password manager, allowing you to store your passwords securely and access them from any device.

    Flowmon Probe

    Flowmon Network

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    Flowmon Collector

    Flowmon Network

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis
     

    https://tw.linkedin.com/company/fortinet

    FORTINET

    Fortinet NSS Labs Recommended for SD-WANFortiGate next-generation firewalls (NGFWs) utilize purpose-built security processors and threat intelligence security services from AI-powered FortiGuard labs to deliver top-rated protection, high performance inspection of clear-texted and encrypted traffic. Next-generation firewalls reduce cost and complexity with full visibility into applications, users and networks and provides best of breed security. As an integral part of the Fortinet Security Fabric next-generation firewalls can communicate within Fortinet’s comprehensive security portfolio as well as third-party security solutions in a multivendor environment to share threat intelligence and improve security posture.

    https://www.fortinet.com/products/sd-wan.html

    FORTINET

    As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers business application steering, cost savings, and performance for Software-as-a-Service (SaaS) applications, as well as unified communication services. However, SD-WAN has its own shortcomings—especially when it comes to security with direct internet access.

    Fortinet FortiGate Secure SD-WAN includes best-of-breed next-generation firewall (NGFW) security, SD-WAN, advanced routing, and WAN optimization capabilities, delivering a security-driven networking WAN edge transformation in a unified offering. Fortinet received second consecutive NSS Labs “Recommended” rating in the SD-WAN Group Test. Fortinet Secure SD-WAN delivered lowest Total Cost of Ownership (TCO) per Mbps among all eight vendors.

    FortiGate IPS

    FORTINET

    FortiGate IPS Overview

    Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses. Fortinet, well known for its next-generation firewall (NGFW) solution, has built IPS technology for more than ten years. Fortinet customers expect and depend on high performance from FortiGate firewalls and FortiGate IPS benefits from this legacy, delivering pound-for-pound, the best IPS performance available in the market today. FortiGate IPS, following a different evolution path than traditional IPS, innovates in ways that other standalone IPS products do not.

    SWG

    FORTINET

    Secure Sockets Layer (SSL) adoption is on the rise, with  at least 60% of internet sites using it as of January 2018. While this provides confidentiality, it’s also a great place for cybercriminals to hide malware. Industry reports indicate that 41% of malicious traffic leverages encryption. In addition, administrators lose visibility of data leaving the enterprise and can’t enforce data loss policies.

    Fortinet firewalls with Gateway Security protects enterprises against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies. Fortinet is the first and only gateway security vendor to earn Virus Bulletin’s VBWeb certification for web filtering effectiveness.

    FortiSandbox

    FORTINET

    With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats.

    While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation.

    Fortinet management

    FORTINET

    Fortinet management and analytics provides powerful and simplified network orchestration, automation, and response for on-premises, cloud, and hybrid environments. Fortinet management and analytics technologies have been tested for more than a decade and is deployed by thousands of customers around the world across all major industry verticals.         

    As enterprise networks morph and change with digital transformation, once relied upon tools have become outdated and obsolete. Yet, many are still deployed alongside newer technology stacks, creating a complex environment that does not interoperate. Enterprises deploy an average of 75 different vendor solutions that lack shared threat intelligence—a cybersecurity hurdle that is often compounded with a lack of skilled cybersecurity personnel to manage these networks.

    Simplified network orchestration, automation, and response helps consolidate complex point products, and is compatible with Fortinet solutions and all Security Fabric-ready partners.

    Multi-Cloud Security

    FORTINET

    Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security for everything that is built, deployed, or stored in the public cloud. Due to multi-cloud adoption, most enterprises maintain heterogeneous environments, with tools from each cloud platform differing significantly.

    FortiDDoS

    FORTINET

    Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

    OT cybersecurity consulting services

    HwaCom

    The popularity of the Internet and IT system architecture has blurred the gap between OT and IT environment, and with the development of emerging IT technologies such as cloud and big data in recent years, many manufacturers or critical infrastructure providers are more likely to have their existing control systems and components (e.g. IACS, DCS, The OT (Operation Technology) of SCADA introduces intelligent manufacturing solutions to connect all the components and systems, so called Industrial Internet of Things (IIoT, Industrial IoT) environment.
    The likelihood of cyberattacks was increased on automated production, manufacturing equipment and critical infrastructure in industries that rely on industrial control systems with this trend of interconnecting and data sharing/analyzing. In further, there was a semiconductor manufacturing company's entire plant was paralyzed by malware for hours and cost billions of Taiwan dollars. As manufacturing and information security industries shocked by this case, management and stakeholders have been concerned about the issue of the Industrial Internet of Things.
    Although management, stakeholders and OT environment asset owners have begun to recognize the importance of information security, but it is difficult to carry out the risk analysis of the industrial control Internet of Things, but also the lack of relevant knowledge to develop a sustainable improvement of the level of capital security protection of security plan, let alone risk communication with stakeholders.
    In order to enable management, stakeholders and OT environment asset owners to escape this “unable to do” circumstances, We deliver professional consulting services based on international industrial security、Internet of Things security management standards and operational practices to help enterprises achieve following goals:

    • Policy and organizations formulation
    • Security risk identification/analysis/mitigation
    • Continuous improvement program
    • Hardware and software implementation
    • Communication with third-party suppliers or stakeholders
    • Cyber Security Management System implementation

    Smart X OT cybersecurity assessment & monitor solution

    HwaCom

    With the Internet of Things (IoT) leading-in to Industrial control environment, network appliances or sensor deployed can be hundreds even more thousands in same area, improve capacity and efficiency, at the same time, increasing the attack surface and risk from hackers.

    HWACOM Inc. provides a totally OT security solution by using CyberX which battle-tested industrial cybersecurity platform. Professional consultant design accurate cybersecurity plan via consider OT-specific connection characteristic, provides customized testing service and consulting services to helping company build security zone for manufacturing industry environment at once.

    1. Asset discovery and security analysis visualization:  
        To stay on top of company's IT/OT asset and network status in depth, identify endpoint vulnerabilities and data leakage pathway exactly on OT environment

    2. Threat Intelligence:
        Track global IoT&ICS cyber intelligence, zero-days, known malware, targeted attacks, hacker campaigns or techniques. On the basis of utilizing big data to real-time identify misconduct and potential threat precisely.

    3. Predict Attack Vector:
        Machine learning with plentiful intelligence in order to predict the most likely paths of hacker attacks, formulate customized security policy in advance, build threat model and incident response, keep the evidence by prudent procedures and forensic tools.

    4. Unified IT/OT Security system:
        Integrate edge device, SIEMs, monitor & cloud, for unified IT/OT security governance, and enhanced company's defense and incident response.

    5. Non-Invasive Deployment:
    Customer doesn't need to change existing architecture, or share their own confidential information to consultant.

    CloudFusion Enterprise 2019

    InfinitiesSoft

    It's InfinitiesSoft's patented and award-winning enterprise multi/hybrid cloud self-service and management software, developed to readily connect with prevailing private cloud hypervisor virtualization technologies (e.g. VMware, Hyper-V, OpenStack, Xen, etc.) and popular public cloud platforms (e.g.AWS, Azure, GCE, AliCloud, etc.) with open APIs to embrace the fast-changing cloud landscape. 
    InfinitiesSoft have been helping leading data centers to transform into cutting edge cloud providers (e.g. AI/GPU Cloud and Big Data Cloud with TWGC under NCHC/NARLab - Taiwan's national HPC centers for advanced research, and Chief Telecom - one of the largest data centers in Taiwan under CHT, just to name a few) with our patented and award-winning technologies and software solutions to help them achieve data center modernization and cloud transformation with feature sets packaged in CloudFusion, offering:

    (1) a unified self-service User Portal (or IaaS Store Front, ushering AWS-like experience) for customer's tenant administrators and end-users to access, buy, and use the hosted datacenter infra as cloud resources, and
    (2) an Operation Portal (or IaaS Backoffice) for cloud provider's administrators to pool/define resources as sellable inventories from prevailing solutions among private/public clouds, and to package/price them into different offers in service catalogs.

    With our solutions, a vast majority of data center/cloud providers' IaaS commerce workflows can be automated and self-serviced, to improve customer experience on par with world-class public clouds and to elevate manageability and efficiency in monetizing cloud infrastructural resources.

    AI-Stack Machine Learning Collaboration and Management Platform

    InfinitiesSoft

    Essentially this AI-Stack software product is a self-contained private-cloud-based computing environment automation and self-service platform, designed for enterprise AI/ML and Big Data scientists/engineers' training, research, and development works, by streamlining (GPU and CPU) computing, (VM and containerized) virtualization, and tool environment (e.g. AI frameworks packaged in selectible container images, and big data frameworks with Cloudera) with AWS-like user experience for infrastructure orchestration, to hide/simplify cloud infrastructural complexities for AI/ML and big data professionals (on average spending around 35% of their working hours preparing the needed IT infrastructures and resources in place before commencing their works).

    It's highly scalable and expandible for your growing demand for IT infrastructures to power your journey along AI/ML, Big Data, and clouds (ready for private, multi, and hybrid clouds).

    Flowmon Probe

    Jnsun Tech

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    Flowmon Collector

    Jnsun Tech

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    N-Cloud / N-Reporter / N-Probe

    N-Partner

    N-Reporter/N-Cloud is the first announcement intelligent IT operation system which can fully integrate 3 major network and security management technologies: SNMP, Flow and Syslog within one solution in the world. The leading skills include: Flow usage analysis and statistic, the most useful helper to detect DDoS attack in real time. Build up dynamic reasonable threshold by event log and flow historical records automatic learning technology, and then trigger an alert when abnormal usage is detected. IT administrators don’t need to set up threshold manually. Collect SNMP, Flow and Syslog data, so IT administrators can search all events and Flow records sending from different IT assets in a single UI. Correlate SNMP, Flow and Syslog data to help IT administrators catching the root cause of an issue within couple of minutes. Build-in big data process engineer can deliver powerful huge data collection and searching capacity to users. Flexible report generation function allows IT administrator to create reports on demand.

    N-Probe:Receive mirror traffic from router/switch and then generate 1:1 NetFlow records sending to flow analysis tools. It can provide 1G/10G/40G interface by real demand. 

    NAKIVO Protects Your Business Data and Applications

    NAKIVO

    NAKIVO Backup & Replication offers an integrated approach to data protection, ensuring that your critical data and applications are safe.

    Network-Box- Omni-directional network security management system

    TONG WEI-NETWORK BOX

    Network Box provides customers with "hybrid firewall", "intrusion detection and protection system", "antivirus gateway", "virtual private network", "spam filtering", "web content filtering", "web application firewall WAF" "DDoS Decentralized Blocking Service Attack Defense" and "Application Control" real-time monitoring and defense management system help enterprises to do the most powerful computer information protection for enterprises in response to rapid network changes and enterprises facing various network threats. To prevent theft of important information, the infringement of electronic digital assets, and the loss of corporate reputation, to prevent and eliminate possible network threats and attacks.

    Information Security Monitoring Management Service

    TONG WEI-NETWORK BOX

    The Security Operation Center provides 7*24 professional monitoring management and consulting, management interface and online real-time reporting, and a professional team provides MSSP (Managed Security Service Provider) web hosting service, complete security management We will help you to solve your own integrated threat management equipment and help enterprises to maximize their protection under a limited budget: (1) Early warning and notification mechanism (2) Instant alarm mechanism, master the latest security trends (3) Alarm message collection And correlation analysis (4) information security equipment adjustment and policy setting (5) accident elimination and tracking processing (6) consulting services (7) to enhance corporate employees' information security awareness

    Weakness analysis audit management service

    TONG WEI-NETWORK BOX

    Weakness analysis audit management services for information security threats companies generally can not effectively grasp the threat information, information personnel often play the fire brigade, but can not effectively deal with information abnormal threats, we provide assistance to the customer information system vulnerability scanning risk analysis audit and advisory services can be effective Help customers keep track of the risks of corporate information and effectively reduce risk of control, support IPv4/IPv6 dual protocol, support Unicode, support CVSS score, support CVE, support CIA impact, support command line mode to perform scan auto-detection communication The communication protocol (Protocol) of the service provided by the service includes the ID connection of the CVE, the intelligent scanning of the network, and the simultaneous scanning of IP address hosts and devices using IPv4 and IPv6 protocols.

    OWL TECHNOLOGY

    Owl Cyber Defense

    Data diodes are hardware based, bound by the laws of physics and not susceptible to zero day vulnerabilities or any other hacks. These solutions are data and network agnostic, have been deployed across a range of industries and are recommended by the Department of Homeland Security. 
    Being data agnostic we can move files, streaming video, TCP/IP, UDP, database records, historians, sensor data, high-res images, system backups, personnel records and many other types of data; along with industrial protocols like Modbus and OPC.  And our network independence lets us work on unclassified, secret and top secret networks for government solutions and IT and OT (Operations Technology) networks for our commercial and industrial customers.

    We offer all-in-one solutions with a standard 19” 1U rackmount form factor and a DIN rail form factor for industrial environments.  We also offer server based solutions that utilize off-the-shelf servers populated with our data diode cards.

    Designed to be scalable, new software licenses and modules allow end-users to increase bandwidth, add-on new interfaces, and support new protocols.

    Thales SafeNet Luna7 Network HSM

    Paysecure Technology

    Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in SafeNet Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-resistant, network-attached appliances offering market-leading performance.

    Easily integrate these network-attached HSMs into a wide range of applications to accelerate cryptographic operations, secure the crypto key lifecycle, and act as a root of trust for your entire crypto infrastructure.

  • Type:Encryption
  • PIXIS DSI

    PIXIS

    ●With PIXIS, enhance local network security, manage IP Addresses and DHCP in a single console, enforce network policies instantly and effectively.
    ●Best NAC,DHCP, and IP/MAC for IPv4 & IPv6
    ●PIXIS DSI (Dual Stack IPAM)  has 4 Features:IP Assignment、Real Time Network Monitoring、Network Access Control、Reporting & Auditing,administrator is easy to handel.
    ●Assign IP by integrating authentication mechanisms to keep track of logon information while ensuring accessibility.
    ●Set intuitive and flexible IP policies, such as assigning IPv6 addresses logically related to IPv4 addresses.
    ●Automatic Topology and Traffic.
    ●Automated subnet discovery and IP scanning reflects real time data in PIXIS DSI. Replace the old-fashioned way that uses Excel to maintain asset inventory.
    ●PIXIS DSI can block the access of foreign devices access the network before authorization.
    ●Administrators can forbid end user to spontaneously change the IP address, and can specify an IP address to be used by a specific IP. PIXIS DSI ensures that only the right device gets to access the network.
    ●Export reports for managerial demand on information like WSUS, after-hour usages, or other requests.
    ●Administrators can look up abnormal events, admin logs, IPv4 / IPv6 / MAC log on and log off records, etc.

  • Type:NAC
  • PA File Sight

    PowerAdmin

    Ransomware Protection

    PA File Sight can detect and protect against ransomware attacks caused by infected client computers that encrypt server files.

    Detection happens via simple detection methods used by other products, as well as more advanced options. Once a ransomware attack is detected, the server is protected and information is shared with other servers so they are protected as well.


    Information Leaks - File Copy Detection, Data Loss Prevention (DLP)

    PA File Sight can see what files clients are interacting with on the server, and can alert when a client is reading an unusually large number of files.

    If the File Sight Endpoint is installed on the client, external (USB) drives can be blocked, and file copying can be detected more accurately which helps in Data Loss Prevention (DLP) efforts.

    OWL TECHNOLOGY

    Simpro Technology Inc

    Data diodes are hardware based, bound by the laws of physics and not susceptible to zero day vulnerabilities or any other hacks. These solutions are data and network agnostic, have been deployed across a range of industries and are recommended by the Department of Homeland Security. 
    Being data agnostic we can move files, streaming video, TCP/IP, UDP, database records, historians, sensor data, high-res images, system backups, personnel records and many other types of data; along with industrial protocols like Modbus and OPC.  And our network independence lets us work on unclassified, secret and top secret networks for government solutions and IT and OT (Operations Technology) networks for our commercial and industrial customers.

    We offer all-in-one solutions with a standard 19” 1U rackmount form factor and a DIN rail form factor for industrial environments.  We also offer server based solutions that utilize off-the-shelf servers populated with our data diode cards.

    Designed to be scalable, new software licenses and modules allow end-users to increase bandwidth, add-on new interfaces, and support new protocols.

    PRIVILEGED ACCESS MANAGEMENT.

    Simpro Technology Inc

    When you need to know and control everything within your organization. When you need to intervene at a moment’s notice- that’s when Fudo PAM’s proactive monitoring gives you the power to detect and terminate any suspicious activity.

    ReaQta

    Simpro Technology Inc

    ReaQta was founded by an elite team of offensive and defensive cyber security experts as well as machine learning researchers. Combining these varied expertise, our team has built a powerful Active Defense Intelligence Platform. Our solution provide clients with advanced detection and response capabilities, without requiring additional or highly skilled personnel. This innovative approach applies the latest A.I. algorithms to automate and simplify the process of detecting and handling new threats.

    On this single, highly integrated active intelligence platform, our clients gain flexibility and speed in performing complex analyses that were only possible with large and highly specialized teams. It is a dynamic approach that doesn’t just protect organisations in the here and now, but also far into the future. With ReaQta, businesses are empowered to pursue growth and ambition fearlessly.

    Fidelis

    Simpro Technology Inc

    Fidelis helps you outperform, outmaneuver and outfight cyber attackers at every step to keep your business operations and data safe. Enterprises are at a disadvantage against their cyber adversaries. Threats come from every angle and many organizations lack complete visibility of their cyber terrain, allowing cyber attackers to lurk undetected as they take aim at sensitive data or look to disrupt business operations. To gain the decisive advantage, security teams need to think like their adversary. This means having greater visibility across the different layers within their environment as well as the automation to scale detection and response capabilities.

    SPAM SQR

    Softnext Technologies Corp.

    SPAM SQR features exclusive filtering technology against spam and threat mails. It has a complete pattern database, fingerprint database, malicious address database and cloud incremental update technology. It also features threat defense engine for email traffic control, social engineering detection engine and file attachment analysis engine, effectively eliminating the risk of zero-day attacks and improving the overall interception performance of a system.

    Mail SQR Expert

    Softnext Technologies Corp.

    Provides email auditing, archiving, and management solution for corporate email management. Its modular expandable design allows users to quickly fix problems found in the management process. 
    Support email lifecycle management in compliance with regulations.Implement the decentralization and flexible email policy management and be ideally suited to each type of enterprise and organization.

    Mail Archiving Expert

    Softnext Technologies Corp.

    Mail Archiving Expert provides not only real-time archiving to eliminate the trouble of deleting important emails by mistake but also complete email lifecycle management. Archived emails are moved automatically to different storage media according to different departments' policy of maintenance time. The flexibility of access authorization management combined with the ability of assigning results to other administrators for refined search to accurately find emails, preventing granting unneeded permission and risk exposure of mail contents to those who should not be given the authority.

    STORMSHIELD SN510

    Stormshield

    A European leader in digital infrastructure security and a wholly-owned subsidiary of Airbus CyberSecurity, we offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

    Our mission: to ensure the cybersecurity and data protection of organizations, their employees, and their customers.

    Our expertise is available in three complementary product ranges for seamless security:

    Protection for industrial and IT networks (Stormshield Network Security)

    As per our Multi-Layer Collaborative Security approach, our product ranges interact with one another to raise the security level of IT, OT, and Cloud environments, regardless of the attack point.

    These trusted, cutting-edge solutions are certified at the highest level in Europe (EU RESTRICTED, NATO, ANSSI EAL3+/EAL4+). Present in over 40 countries via our network of distributor partners, we ensure the protection of strategic information for companies of all sizes, public administrations, and defense agencies throughout the world.

    Acronis Cyber Backup

    T-Tech System

    Businesses can be at risk of losing important data. Lost data leads to costly downtime, customer dissatisfaction, regulatory fines, and lost revenue. As a result, IT pros must meet extremely high expectations. You need to keep the company running 24-hours a day.

    Acronis Backup delivers the data protection that meets today’s demands. It keeps your business running, protecting any workload, scaling without limits, and saving you money.

    Acronis Backup keeps your business operations running by ensuring your data is always available. AI- and ML-based technologies proactively defend data against ransomware attacks, and with near-instant recoveries, you’ll meet even the shortest RTO, avoid operational outages, loss of productivity and costly downtime caused by infections and recovery efforts.

    Acronis Backup reliably protects any data source on 21 platforms - virtual, physical, cloud and mobile, regardless of the size or location of the data. As your data needs grow or your infrastructure evolves, keeping company data secure is easy with flexible, scalable storage and simple backup administration.

    Increase overall performance of your production systems and avoid unnecessary disruptions while moving to another system. Improve recovery point objectives (RPO) with the ability to run frequent backups. Instantly protect your systems with the simplest install process possible.

    F-Secure Business Suite

    T-Tech System

    Scalable on-site business security for organizations of all sizes 
    Designed to simplify the demanding security needs of today's organizations

    F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

    • Layered protection to protect your assets from gateway to endpoint
    • Best protection levels covering both known vulnerabilities and new, emerging threats
    • Advanced management features to allow you full control of your organization's IT security
    • Less work through automation of daily tasks
    • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes

    Advance Penetration Test

    Talent-Jump Technologies, Inc.

    Penetration Scanning tool is a rigid tool, but the hacker is live with thousands of unpredictable minds. The way we can discover hidden vulnerabilities is relying on the white-hat hacker to perform the advanced penetration testing, so we can actually understand our risk and know how to fix them.

    APT Threat Intelligence Detection & Response.

    Talent-Jump Technologies, Inc.

    Our professional security consultant are expert on handling hacking incident, bundle with Threat Sonar APT Intelligence detection platform, we can react to APT challenge and response before the incident.

    Vulnerability Assessment

    Talent-Jump Technologies, Inc.

    There is always a security flaw that could be lead to be exploit but we never know, we could perform vulnerability assessment periodicity to find out vulnerabilities which we did not noticed, and our professional consulting service could also provide the most suitable solution for further improvement plan.

    ThreatVision

    Team T5 Inc.

    ThreatVision is a cyber threat intelligence platform that helps customers to identify threats, know the adversary, and increase situational awareness. ThreatVision bridges TeamT5 analysts and clients to fusion of external and internal intelligence, integrates cyber threat intel and malicious sample identification mechanism. Customers can access TeamT5 intelligence database through ThreatVision's portal to search or request for an analysis of the threats about its malware families, adversary groups, and indicators.

    ThreatSonar

    Team T5 Inc.

    TeamT5 offers an advanced threat hunting technology and platform - ThreatSonar. It is a very unique tool for defense on post-exploitation stage. With the leading intelligence of cyber espionage attackers, TeamT5 designed a unique technology and invented a methodology to help clients dealing with targeted attacks. It has already scanned more than 500K endpoints and kept helping people to discover threats that their existing security solutions couldn't see.

    Thales SafeNet Luna7 Network HSM

    Thales

    Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in SafeNet Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-resistant, network-attached appliances offering market-leading performance.

    Easily integrate these network-attached HSMs into a wide range of applications to accelerate cryptographic operations, secure the crypto key lifecycle, and act as a root of trust for your entire crypto infrastructure.

  • Type:Encryption
  • AgileLink-Wan load balance

    UGuard

    UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
    By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

    UAC-Unified Access Controller

    UGuard

    Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides  extensive monitoring reports for daily operations.
    No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.

    NAKIVO Protects Your Business Data and Applications

    VBUSTER Technology

    NAKIVO Backup & Replication offers an integrated approach to data protection, ensuring that your critical data and applications are safe.

    PA File Sight

    VBUSTER Technology

    Ransomware Protection

    PA File Sight can detect and protect against ransomware attacks caused by infected client computers that encrypt server files.

    Detection happens via simple detection methods used by other products, as well as more advanced options. Once a ransomware attack is detected, the server is protected and information is shared with other servers so they are protected as well.


    Information Leaks - File Copy Detection, Data Loss Prevention (DLP)

    PA File Sight can see what files clients are interacting with on the server, and can alert when a client is reading an unusually large number of files.

    If the File Sight Endpoint is installed on the client, external (USB) drives can be blocked, and file copying can be detected more accurately which helps in Data Loss Prevention (DLP) efforts.

    Votiro

    Votiro

    ■  Disarmer for EMAIL
    1. Function
    (1) Supports all mail system 
    (2) Retains complete email content and attachment
    (3) Easy to deploy and integrate with email server
    2. Context of Use
    (1) Prevent Email extortion scams 
    (2) Ensure the URL Link in the email and attachement is safe

    ■ Disarmer For WEB
    1. Function
    (1) Provides security for browser downloads
    (2) Prevent weaponized files to be loaded to endpoint
    2. Context of Use
    (1) Security protection on "save as" in web browser

    ■ Disarmer For File Transfer
    1. Function
    (1) Integrats with current file server
    (2) Supprts internet isolation  structure
    (3) Achieve seamless file transfer
    2. Context of Use
    (1) Security on file transfer between internet and intranet
    (2) High security files/ Quarantined files

    ■ Disarmer For Removable Device
    1. Function
    (1) Security protection on importing files from portable media devices
    (2) User-friendly interface 
    (3) Can be established according to unit protection policy
    2. Context of Use
    (1) Safety control on imported files
    (2) Record on exported files

    ■ Disarmer API
    1. Function
    (1) Integrates with existing programs
    (2) Safe REST API 
    (3) Supports complexed file quarantine and exchange structure
    2. Context of Use
    (1) Security protection on program file exchange (For example, submit for publication, quiz contest, public opinion mailbox, questionnaire, project plan documents)

    PRIVILEGED ACCESS MANAGEMENT.

    Wheel Systems

    When you need to know and control everything within your organization. When you need to intervene at a moment’s notice- that’s when Fudo PAM’s proactive monitoring gives you the power to detect and terminate any suspicious activity.

    KVHSM

    WISECURE

    KeyVault Hardware Security Module (KVHSM) is a physical device in the PCIe form that stores and manages cryptographic keys. KVHSM provides a robust environment for cryptographic operations. It is designed in reaction to compromising, physical intrusion, tampering, etc. The military-grade secure element, with CC EAL 5+ certification, mitigates risks of key leakage and dismisses the threat posed by side channel attack (SCA). Applications include high-speed cloud encryption and cryptographic functions such as digital signature, hash function, identification, and key management.

    ▲Cryptocurrency Exchange Key Management 
    KVHSM provides a highly customizable platform, leaving room for flexible application design. It manages the entire life cycle of private keys, including generation, distribution, storage, destruction and archiving, and the core engine executes encryption, decryption, signing, verification and hashing for cryptocurrency transactions. It also strikes a commensurate balance between security and performance. Furthermore, KVHSM can detect physical intrusion and activate countermeasures in response; side-channel attack, reverse engineering, tampering are within the scope of data protection.

    ▲Authentication Server (IoT Ecosystem) & Cloud Crypto Service
    Internet of Things (IoT) ecosystem comprises a data center (public or private cloud), gateways (intermediary communication gateways), and endpoint devices (distributed IoT devices). For the data center, it receives collected data communicated by gateways, in the path of which lies two conspicuous risks, eavesdropping and tampering. In this regard, data encryption prior to communication and authentication are integral to secure and sustainable operation. KVHSM can be embedded onto the cloud for data protection, identification, blockchain, digital signature for authorized devices, management of firmware update and master key lifecycle.

    ▲Bring Your Own Key (BYOK)
    While cloud service features many advantages, a major disadvantage has been security, because encrypted data and keys are physically stored and managed by cloud service providers (CSP) and out of the control of the owners. 
    Bring Your Own Key (BYOK) is a way for enterprises to retain control and management of their encryption keys. Storing strong keys in KVHSM and establishing secure channels allow enterprises to utilize cloud service without concerns and control important digital assets

    μSD/X

    WISECURE

    μSD/X is a hardware security module coming in the form of a microSD card. It provides security services driven by hardware-based crypto engines, including encryption, key generation and life cycle management, digital signature, authentication and other crypto functions. It is used in secure authentication, sensitive data encryption, secure communication and secure mobile payment.

    ▲Network authentication 
    The mechanism built for μSD/X can be used for firmware OTA (over-the-air) upgrade, parameter update, device management and other applications. It provides end devices with cryptographic services, featuring public key certificates or private key verification to mitigate risks of counterfeit or hijacking.

    ▲Data storage encryption 
    μSD/X enables flexible space usage, allowing users to set open areas and encrypted areas. Only when authentication succeeds are data inside encrypted areas accessible. Customizable hardware cryptographic engines are adopted for disk encryption, ensuring optimal encryption service. Some competitive products are vulnerable to cyberattack due to software-based security design. Still some are equipped with hardware-based security design but deficient in performance, failing to satisfy the need for smooth data operation. μSD/X resolves the dilemma by accelerating storage encryption based on hardware-based security, intensely protecting users’ digital assets without compromising performance.

    ▲End-to-end secure communication 
    μSD/X's feasibility enables high-speed data encryption. Its protocol can also be tailored for private messengers such as Telegram and Signal in order to meet users’ communicative security requirements. In software-based secure communication exist risks and vulnerabilities while the hardware-based one built inside μSD/X strengthens the client side’s resistance to spoofing or tampering attacks. To make the solution more user-friendly and accessible, software development kits (SDK) are available for Telegram and other applications. Onto every platform and device can it be deployed with easy adjustment, saving considerable time and operation cost.

    ▲Cryptocurrencies’ private key protection 
    μSD/X protects cryptocurrencies’ private keys and operates digital signature for transaction. Inserted into a mobile device, μSD/X makes it function as a cold wallet, enabling users to transact without physical tokens in the form of cards or USB. As to security level, it is equipped with a CC EAL 5+ certified secure element, effectively resisting side-channel attack and reverse engineering.

    XCome EMM (Enterprise Mobility Management) solution - SkyMDM

    XCome Technology

    XCome EMM(Enterprise Mobile Management)solution - SkyMDM, includes the following main functions:
    Mobile device basic function management and control:

    • Device function management: Camera, microphone, screen capture restriction...
    • Date and time restriction: Date and time setting restriction.
    • Password policy: Rules and strength of password setting.
    • Certificate Management Policy: Upload, install, and manage digital certificates as a basis for authorizing network or service access.
    • Security management: Device white/black list, remote execute factory reset, remote lock...

    Wi-fi and Networks management:

    • Mobile network management: Mobile network, outgoing call, SMS, data roaming restriction...
    • Wi-Fi restriction and management: Wi-Fi config, Wi-Fi state(always on/off) restriction.
    • Tethering restriction.
    • APN setting and management.
    • Chrome browser setting: website white/black list, proxy setting...

    File transfer and storage management:

    • Bluetooth state(on/off), Bluetooth share restriction.
    • USB file transfer, physical media restriction.
    • Out-going beam restriction.

    Location service and tracking

    • Location share restriction.
    • Location tracking.
    • Location map, Latitude and longitude.

    Kiosk mode setting

    • Setting Kiosk mode.
    • Kiosk mode app setting.

    Application Management:

    • APP store management: APP list, APP upload, APP delete…
    • APP white list.
    • APP runtime permission setting.
    • Remote Silent install, remote un-install.
    • APP install, APP un-install restriction.

    FOTA Management(Requires customized mobile device)

    • Device Firmware update management.
    • Group of devices firmware upgrade.
    • Device Firmware upgrade status statistics and report.

    Advanced Management

    • Dashboard: SkyMDM dashboard can clearly show the current status, compliance status, policy delivery status, etc. of the mobile device.
    • Report and Log management: Provide system and device status report and log. Clearly understand the effectiveness of mobile device configuration and follow-up review.

    Xena

    Xena Networks

    Xena SAFIRE

    Enterprise Firewall Performance Tester

    Enterprise firewalls improve network security by segmenting corporate LANs. However, each of the advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) has a performance penalty. Combined, these features can seriously reduce network performance (in some instance up to 90%) – frustrating users and reducing business performance.

    Safire is the only solution on the market that solves this problem quickly and cost-effectively.

    TECHNOLOGIES:  Network Security

    USED BY:
    Enterprise IT
    Network Security
    System Integrators
    Data Centers
    Finance
    Government
    Defense