Speed up to get your ideal solutions
 

Welcome to Asia Cyber Channel Summit Virtual

This year’s ACCS Virtual consists of the integration of online multimedia and online business matching activities through the virtual sales expansion platform. There will be more than 30 Taiwanese cyber security providers who will be exhibiting their products and solutions in ACCS Virtual. You are welcomed to take this opportunity to deepen the interactions with Taiwanese providers and strengthen the information security abilities at the same time; and also to create a safer digital world through this win-win business cooperation.

Briefing

Turn-key crypto wallet management platform for enterprise

CYBAVO provides Next Generation ID-based Key Management for blockchain keys built upon strong encryption and authentication technologies. On the one hand, CYBAVO offers a complete suite of solutions for secure blockchain private key management, including a secure cryptocurrency custody and management platform for enterprise which unifies institutional-level security with online-banking usability; CYBAVO also offers a keyless crypto wallet SDK and an enterprise blockchain solution.

Watch Now

Cybersecurity Compliance Solutions for Connected Devices

As the intrusion methods of connected devices are constantly updated, the difficulty of test technology and labor costs are getting higher and higher. How to conduct a complete internal security test is the focus of global IoT and industrial control equipment manufacturers. To this end, Onward Security has invested in the research and development of security test tools many years ago, hoping to help manufacturers solve product security problems with automated tools. It introduced HERCULES SecFlow and SecDevice, which are automated product security assessment platforms aimed to help firms implement DevSecOps.

Watch Now

State-of-the-art PAM Product from Taiwan!

ANCHOR has 3 security goals of privileged access management that includes Privileged Access Life-cycle Management, APT Attacks Prevention, and Threat Alert. To cope with the requirements for Work from Home in the period of COVID-19, we also developed an optional module for adopting Endpoint management rapidly. All-in-one, Secure, Convenience, Pro-active and State-of-the-art PAM product is always the motto of ANCHOR product development.

Watch Now

From SOC to SOAR –Time does matter & H.E.I.S-Human Error Insight system

1. M.O.C (Monitoring and Operation Center)-M.O.C is an integrated cybersecurity operation service run by SOAR mechanism and ITIL methodology. MOC is able to correlate log and event from various audit and monitoring systems and provide integrated analysis to clients. We aim to provide high-level system management service in a more economical way and hopes to expand to overseas markets. 2. H.E.I.S(Human Error Insight System)-According to the research, each office worker receives an average of 60 e-mails per day, and about 20% of the emails are phishing or spam mail. That means each worker will receive over 2000 risky e-mails in a year. What should we do to enhance employees’ cyber-awareness, and get capability to identify hackers’approach?

Watch Now

Welcome to...CyberSecurity Technology Institute

Leading in serving the public sector in Taiwan, the Cybersecurity Technology Institute (CSTI) is aimed at providing technology solutions and services for its clients in confronting with emerging security challenges in cyberspace. As the traditional defense equipment has no longer provided enough ability in preventing potential threats. CSTI is going to introduce two technology applications for emerging threats: SecBuzzer ESM (Enterprise Security Management) and DTM (Detection Tagging Mitigation).

Watch Now

BGP Security in Hybrid Network

BGP itself is a trustful based protocol, so everyone can be trusted, BGP announcements are genuine and no security mechanisms are employed in standard BGP. We implement a security extension for SD-BGP that consists of three modules, TCP authentication module, Prefix validation module and AS path validation module to protect BGP session from different perspective.

Watch Now

Defend Future With You

Exploring Excellent Cyber Security Vendors from Taiwan,
Your Trustworthy Cyber Security Solution Partners

Endorsed by
Organizer
Co-Organizer

Asia Cyber Channel Summit 2019

86%

Satisfaction

88%

Will visit again

80%

Appreciate matchmaking