Speed up to get your ideal solutions
 

Welcome to Asia Cyber Channel Summit Virtual

This year’s ACCS Virtual consists of the integration of online multimedia and online business matching activities through the virtual sales expansion platform. There will be more than 30 Taiwanese cyber security providers who will be exhibiting their products and solutions in ACCS Virtual. You are welcomed to take this opportunity to deepen the interactions with Taiwanese providers and strengthen the information security abilities at the same time; and also to create a safer digital world through this win-win business cooperation.

Briefing

X-FORT Enterprise Electronic Data Surveillance System

X-FORT provides a comprehensive endpoint security solution includes DLP, DRM, and ITAM. It prevents confidential information from breaching or losing, and provides the management tools of applications, computer assets, and remote control.

Watch Now

Use SkyMDM - XCome MDM solution to protect information security of mobile device

XCome MDM solution-SkyMDM can effectively and quickly control the information security of mobile devices. Through this platform, enterprise can centrally control all mobile devices, rapidly mass deployment. Set different management policies according to different groups. includes control of basic mobile phone functions: such as Camera, WI-FI, Bluetooth , USB access and other restrictions, APP management: such as APP whitelist, run time permissions and other settings. Our key success cases, semiconductor manufacturer TSMC and government organizations, through XCome SkyMDM , quickly and mass deployment of nearly 10,000 mobile phones, to achieve their goal of enterprise mobile security control.

Watch Now

Intelligence-driven Network Defense

Many people know threat intelligences can be used to enhance security, but only few of them realizes an intelligence-driven real time defense system. Some tries to do it by importing IoCs, malicious IP/domain objects extracted from the intelligence, to NGFW or IPS but fail because of insufficient capacity to carry a long IoC list that usually includes millions of objects. PacketX GRISM is an advanced network visibility platform with a built-in intelligence-driven defense function that can detect or block the cyber attack according to the a massive IoC list. We would like to introduce how PacketX leverage the power of threat intelligence to build the security frontline.

Watch Now

AgileLink NextGen WAM Management Introduction

Features: SD-WAN、Quality Control, Security Control, Load Balancing. UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connections, help to ensure greater reliability, bandwidth and redundancy network services for the enterprise, improved application performance, raising traffic visibility and reduce complexity of WANs cost. By leveraging multiple connections (T1, xDSL, Cable, 3G/4G etc.) , AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

Watch Now

BGP Security in Hybrid Network

BGP itself is a trustful based protocol, so everyone can be trusted, BGP announcements are genuine and no security mechanisms are employed in standard BGP. We implement a security extension for SD-BGP that consists of three modules, TCP authentication module, Prefix validation module and AS path validation module to protect BGP session from different perspective.

Watch Now

SOAPA Dashboard - Zero Trust Assurance Suite

SOAPA Dashboard is a SOAR (Security Orchestration, Automation and Response) platform that has powerful capability to automate and orchestrate security incident response processes. SOAPA Dashboard empowers your organization to analyze and respond to incidents faster, more intelligently and more efficiently. Key Features ● Dynamic CMDB update ● Repair and response task assignment ● ISAC Response Knowledge DB ● Workflows for accurate and efficient incident response

Watch Now

Defend Future With You

Exploring Excellent Cyber Security Vendors from Taiwan,
Your Trustworthy Cyber Security Solution Partners

Endorsed by
Organizer
Co-Organizer

Asia Cyber Channel Summit 2019

86%

Satisfaction

88%

Will visit again

80%

Appreciate matchmaking