MAR. 19 - 21
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
March 19 to 21, 2019
Taipei International Convention Center (TICC)
Taipei World Trade Center Hall 1, 2F
Flagship Pavilion: TICC 1F
Exhibition Hall: TICC 1F
Exhibition Gallery: TICC 1F & 2F
Taipei World Trade Center Hall 1, 2F
Cyber Taiwan Pavilion
The largest cyber security exhibition in Taiwan, featuring more than 180 exhibitors
Gathering more than 180 cyber security exhibitors, presenting the latest solution for cyber security
The flagship pavilion is located on the first floor of Taipei International Convention Center. The exhibitors from Taiwan and abroad may present their products and provide their service with a spacious booth design.
Across the first and second floors of Taipei International Convention Center and the second floor of the World Trade Center, more than 180 well-known international and local brands will showcase the latest, most popular products and services for cyber security nowadays. Learn about all the most cutting-edge measures and tools.
After arriving at the venue, please be sure to request the "Taiwan Cyber Security Landscape: CYBERSEC 2019 Edition" exclusively designed for this exhibition. Use the directory to plan your visit and find the cyber security products you desire efficiently.
This expo is absolutely wonderful. I found products that I could use immediately to resolve issues! - Chief information officer from manufacturing industry
Cyber Lab is extremely impressive. - Engineer from oil, water, and power industry
Amidst this exchange of information between professionals, I learned a lot. - Security engineer of telecom company
Helped me understand the similarities and differences between software and hardware equipment in the field of cybersecurity. - Information Industry Marketing Supervisor
Attending this conference, I learned about the multiple facets of cybersecurity trends, shared with many domestic and foreign experts, and got to know about currently available security products through many vendor booths. - Chief information officer from medical industry
I got to better understand the current conditions of cybersecurity, including incidents, product trends, and corporate security budget arrangements. - Software development engineer of cybersecurity startup
Learning more about cybersecurity issues helped me in my auditing work. - Head of auditing, media communications industry
TWM’s Multi-layer Anti-DDoS Service is constructed on TWM backbone network. It can block massive DDoS attack data packets. Enterprise clients can deploy DDoS defense without changing their network infrastructures. The service can detect and defense different types of DDoS attacks from layer 3 to layer 7 24x7.
Built on leading Nessus security technology, Tenable.sc and Tenable.io are market-leading Cyber Exposure Platform, which gives you a comprehensive picture of your network and IT assets. You get real-time, continuous assessment of your security and compliance posture so you can discover unknown assets and vulnerabilities, monitor unexpected network changes and prioritize weaknesses to minimize your cyber risk and prevent breaches. It is the only solution that brings together discovery of on premises and cloud-based assets, active and passive vulnerability assessment, configuration auditing, change detection, malware detection, threat intelligence and analysis of network and user activity.
Cloud DDoS Protection Service offering Radware’s industry leading DDoS protection services including Hybrid Cloud DDoS Protection Service integrated with a fully-managed on-premise DDoS protection device, an Always on Cloud DDoS Protection Service where all the traffic is routed through Radware’s cloud centers, and an On-Demand Cloud DDoS Protection Service where traffic is diverted to Radware’s cloud centers only when an attack is detected.
Scalable on-site business security for organizations of all sizes
Designed to simplify the demanding security needs of today's organizations
F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.
Designed specifically for payment applications, payShield 9000 from Thales eSecurity is a proven HSM that performs such tasks as PIN protection and validation, transaction processing, mobile and payment card issuance, and key management. The payShield 9000 payment HSM security solution delivers high assurance protection for automated teller machine (ATM) and point of sale (POS) credit and debit card transactions.
AXIOM is the only platform that captures and analyzes smartphone, computer, cloud, IoT, and third-party image data, in a single case file — ensuring that no evidence is missed. AXIOM simplifies investigations by surfacing the most relevant evidence into user-friendly artifacts.
Allied Telesis Secure Enterprise Software Defined Networking™ (SES) is a state-of-the-art network management and security solution. It provides what enterprises consistently tell us they need: reduced network management costs, increased security and an improved end-user experience.
1. AUTOMATIC SECURITY THREAT ISOLATION AND REMEDIATION
Most organizations utilize an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) to defend their network from attacks. However, an IPS can introduce latency and bottlenecks, and most IDS can only warn if a threat has been found; they cannot act to block the offending traffic. By the time the operator reacts to the warning, it may be too late. It is then capable of automatically quarantining the suspect device and applying remediation so that it can re-join the network with a minimum of network disruption and without manual intervention. Responses are configurable and comprehensive logging provides a clear audit trail of the actions taken. This is a truly innovative feature that helps organizations avoid lost time and unnecessary disruption to services.
2. BLOCK THREATS AT SOURCE
Most IPS solutions are only capable of blocking suspicious traffic as it passes through the IPS device. Since this tends to be near the gateway to the Internet, only external threats can be detected and blocked (this is the traditional “secure border” model). However, SES can isolate traffic anywhere in the network, so it can prevent threats not only on the border, but threats inside the network too through USB drives, BYOD, etc. This makes SES an innovative security solution that can monitor traffic entering and traversing the local network without introducing latency or bottlenecks.
3. WIRED AND WIRELESS SDN
SES is the first commercial SDN solution for wireless networks that offers programmability and control inside the network where it is most vulnerable. Allied Telesis wireless access points are OpenFlow capable and can be controlled by the SES controller to provide a dynamic wireless network that offers end-users a better experience. New policies and security updates can be easily implemented from the centralized controller to all access points in seconds, to dramatically cut the time required for network and security management, with a corresponding reduction in operating costs.
4. OPEN AND FLEXIBLE SDN SOLUTION
SES interoperates with networks containing compatible OpenFlow switches, and a range of physical and virtual firewall products. There is no need for a forklift upgrade of the network to take advantage of the benefits of SES – it can interoperate with a wide range of existing equipment.
SES also integrates with Allied Telesis Autonomous Management Framework™ (AMF), which is a powerful network management and automation tool that also delivers cost and time savings. When used with AMF, SES no longer relies on the OpenFlow protocol to communicate with the network devices. Instead it can use AMF to deliver instructions to conventional network devices. Therefore, this provides all the benefits of an SDN solution without the need for OpenFlow. This lowers the risk and cost for enterprises to adopt SDN solutions since their existing network can remain unchanged.