March 19 to 21, 2019
Taipei International Convention Center (TICC)
Taipei World Trade Center Hall 1, 2F
Flagship Pavilion: TICC 1F
Exhibition Hall: TICC 1F
Exhibition Gallery: TICC 1F & 2F
Taipei World Trade Center Hall 1, 2F
Cyber Taiwan Pavilion
Gathering more than 180 cyber security exhibitors, presenting the latest solution for cyber security
The flagship pavilion is located on the first floor of Taipei International Convention Center. The exhibitors from Taiwan and abroad may present their products and provide their service with a spacious booth design.
Across the first and second floors of Taipei International Convention Center and the second floor of the World Trade Center, more than 180 well-known international and local brands will showcase the latest, most popular products and services for cyber security nowadays. Learn about all the most cutting-edge measures and tools.
After arriving at the venue, please be sure to request the "Taiwan Cyber Security Landscape: CYBERSEC 2019 Edition" exclusively designed for this exhibition. Use the directory to plan your visit and find the cyber security products you desire efficiently.
This expo is absolutely wonderful. I found products that I could use immediately to resolve issues! - Chief information officer from manufacturing industry
Cyber Lab is extremely impressive. - Engineer from oil, water, and power industry
Amidst this exchange of information between professionals, I learned a lot. - Security engineer of telecom company
Helped me understand the similarities and differences between software and hardware equipment in the field of cybersecurity. - Information Industry Marketing Supervisor
Attending this conference, I learned about the multiple facets of cybersecurity trends, shared with many domestic and foreign experts, and got to know about currently available security products through many vendor booths. - Chief information officer from medical industry
I got to better understand the current conditions of cybersecurity, including incidents, product trends, and corporate security budget arrangements. - Software development engineer of cybersecurity startup
Learning more about cybersecurity issues helped me in my auditing work. - Head of auditing, media communications industry
Dedicated Hardware Security Module
DHSMs (Dedicated Hardware Security Module) serve as invincible shields protecting digital assets via physical unclonable and tamper-evident key management, high-speed AES encryption, ECC digital signature and PKI-based certification, elaborated to fulfill profitable and cost-efficient applications, such as IoT authentication, servers’database encryption, time-stamping, firmware and software protection, hierarchical deterministic wallets, blockchain, etc.
These cryptographic operations concur with countermeasures against differential power analysis (DPA), ensuring seamless integration among cryptographic and application layers. Besides, the secure element meets requirements of Common Criteria EAL 5+, guaranteeing military-standard protection.
Trustworthy Computing and Signing Platform for Blockchain
Blockchain use cases involve digital signature, hashing, Hierarchical Deterministic (HD) keys, among which private keys are used to transfer money from one account to another account. That is to say, if someone gets a user’s private key, he can transfer all the user’s money to his own account. Common targets are no other than financial institutions like banks, digital currency exchanges, etc. In view of threats, DHSMs not only provide a military-standard storage for private keys but also streamline key management, accelerate crypto-graphic computation and customizable extensive applications.
Fulfillment of IoT Authentication & Secure Communication
In light of vulnerabilities dwelling among mutual authentication, cryptographic schemes should be adopted to ward off unauthenticated access. At this point, DHSMs can protect the server from unauthorized access via PKI (Public Key Infrastructure), encrypt transmitted data, secure firmware update, invalidate any attempt to appropriate devices.
Great Strides Made to Secure Mobile Payment and Transaction
During mobile payment, TSM (Trusted Security Management) plays a vital role in serving users in a leak-proof manner. Users’ personal information, transaction records, confidential data should steer clear of any possibility of exposure to malicious users. Therefore, security mechanism becomes a determining factor in to what extent we can fulfill security goals, generally comprising integrity preserving, confidentiality protecting and availability promoting for authorized users.
DHSMs can fulfill a series of cloud-based security functions, including encrypting database, deriving keys in different scenarios, ensuring the integrity of transaction records, launching secure connections between devices and clouds, etc. Secret parameters are stored in a military-standard secure element, and if there’s any external intrusion, a self-destructive mode will be triggered, making sure they won’t be appropriated.
Low Profile PCIe Card
Operation 0°C to 60°C
PCI-Express Gen 2 x 4 Lane
AES 256 CTR: 8Gbps
AES 256 XTS: 8Gbps
Disk Encryption: 1GB/s
File Encryption: 1GB/s
Elliptic Curve Cryptography (ECDSA,ECDH, ECIES) with named and user-defined curves
AES 256 (XTS, CTR, CBC, ECB)
SHA-2, SHA-3, HMAC
•Random Number Generation
TRNG (AIS-31 Certified)
Physical Security Design
CC EAL 5 + Security Chip
LogRhythm NextGen SIEM Platform-Achieve End-to-End Threat Detection and Response in a Single Platform
To effectively fight threats, you need the right tools. The LogRhythm NextGen SIEM Platform aligns your team, technology, and processes. It helps you see broadly across your IT environment, identify threats, and quickly mitigate and recover from security incidents.
LogRhythm’s end-to-end solution helps you uncover threats and minimize your risk though Threat Lifecycle Management (TLM), a detection and response framework for security operations centers (SOCs). TLM enables you to sift through the noise, investigate concerning incidents, and increase your organization’s security maturity.
Imperva CounterBreach protects enterprise data stored in enterprise databases, file shares and cloud applications from the theft and loss caused by compromised, careless or malicious users.
The requirements for documents security of Taiwanese businesses have grown from 「image capture backup」to focusing on「audit trail record」. The protection of businesses secrets has evolved from after-the-fact auditing to analyzing and preventing unusual activities in advance of the businesses secrets leaking. Ricoh Taiwan will unveil DocTracker AI during the 2019 Cybersec. Combining Machine Learning, this solution will achieve the ultimate goal of taking preemptive measures to protect business secrets and Ricoh Taiwan will usher in the next era of document security.
HiGuard X is an all-in-one UTM that operates at gigabit speed up to 1.8 Gbps and carries several main categories across your network security deployments: firewall security protection, policy auditing (anti-virus, In-Line IPS, content filtering, VPN bandwidth, and authentication), and easy management (wireless AP control, bulletin board and Co-Defense). The web-based interface provides friendly and consistent user experience, auto firmware update, and multi-languages supported. Configuration files can be imported and exported directly to and from HiGuard X. By simply plugging in a USB modem into HiGuard X, wireless 3G, 4G/LTE are supported to offer secure and uninterrupted WAN connectivity.