MAR. 19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

Exhibition Information


Explore a theme-oriented cyber security expo with a large-scale and diverse demonstration


March 19 to 21, 2019


Taipei International Convention Center (TICC)
Taipei World Trade Center Hall 1, 2F

Themes and Sectors


Flagship Pavilion: TICC 1F
Exhibition Hall: TICC 1F
Exhibition Gallery: TICC 1F & 2F
Taipei World Trade Center Hall 1, 2F

Cyber Taiwan Pavilion


Free Attendance

The largest cyber security exhibition in Taiwan, featuring more than 180 exhibitors


Gathering more than 180 cyber security exhibitors, presenting the latest solution for cyber security

The All-New "Flagship Pavilion"

The flagship pavilion is located on the first floor of Taipei International Convention Center. The exhibitors from Taiwan and abroad may present their products and provide their service with a spacious booth design.

Flagship Pavilion Brands

Brand-New Plans for the "Exhibition Hall" and "Exhibition Gallery"

Across the first and second floors of Taipei International Convention Center and the second floor of the World Trade Center, more than 180 well-known international and local brands will showcase the latest, most popular products and services for cyber security nowadays. Learn about all the most cutting-edge measures and tools.

Exclusive "Taiwan Cyber Security Landscape" Themed Guide -- Explore the exhibition more efficiently by using the map

After arriving at the venue, please be sure to request the "Taiwan Cyber Security Landscape: CYBERSEC 2019 Edition" exclusively designed for this exhibition. Use the directory to plan your visit and find the cyber security products you desire efficiently.

Products All >


more >

Dedicated Hardware Security Module

Dedicated Hardware Security Module
DHSMs (Dedicated Hardware Security Module) serve as invincible shields protecting digital assets via physical unclonable and tamper-evident key management, high-speed AES encryption, ECC digital signature and PKI-based certification, elaborated to fulfill profitable and cost-efficient applications, such as IoT authentication, servers’database encryption, time-stamping, firmware and software protection, hierarchical deterministic wallets, blockchain, etc.

These cryptographic operations concur with countermeasures against differential power analysis (DPA), ensuring seamless integration among cryptographic and application layers. Besides, the secure element meets requirements of Common Criteria EAL 5+, guaranteeing military-standard protection.

Trustworthy Computing and Signing Platform for Blockchain 
Blockchain use cases involve digital signature, hashing, Hierarchical Deterministic (HD) keys, among which private keys are used to transfer money from one account to another account. That is to say, if someone gets a user’s private key, he can transfer all the user’s money to his own account. Common targets are no other than financial institutions like banks, digital currency exchanges, etc. In view of threats, DHSMs not only provide a military-standard storage for private keys but also streamline key management, accelerate crypto-graphic computation and customizable extensive applications.

Fulfillment of IoT Authentication & Secure Communication
In light of vulnerabilities dwelling among mutual authentication, cryptographic schemes should be adopted to ward off unauthenticated access. At this point, DHSMs can protect the server from unauthorized access via PKI (Public Key Infrastructure), encrypt transmitted data, secure firmware update, invalidate any attempt to appropriate devices. 

Great Strides Made to Secure Mobile Payment and Transaction
During mobile payment, TSM (Trusted Security Management) plays a vital role in serving users in a leak-proof manner.  Users’ personal information, transaction records, confidential data should steer clear of any possibility of exposure to malicious users. Therefore, security mechanism becomes a determining factor in to what extent we can fulfill security goals, generally comprising integrity preserving, confidentiality protecting and availability promoting for authorized users.

DHSMs can fulfill a series of cloud-based security functions, including encrypting database, deriving keys in different scenarios, ensuring the integrity of transaction records, launching secure connections between devices and clouds, etc. Secret parameters are stored in a military-standard secure element, and if there’s any external intrusion, a self-destructive mode will be triggered, making sure they won’t be appropriated.
Low Profile PCIe Card
Operation 0°C to 60°C
•Host Interface
PCI-Express Gen 2 x 4 Lane
•OS Support
AES 256 CTR: 8Gbps
AES 256 XTS: 8Gbps
Disk Encryption: 1GB/s
File Encryption: 1GB/s
RSA (1024-2048)
Elliptic Curve Cryptography (ECDSA,ECDH, ECIES) with named and user-defined curves
•Hash/Message Digest
•Random Number Generation
TRNG (AIS-31 Certified)
DRBG (SP800-90)
DPA countermeasures
Reset Button
Physical Security Design
CC EAL 5 + Security Chip

more >


more >

LogRhythm - NextGen SIEM Platform

LogRhythm NextGen SIEM Platform-Achieve End-to-End Threat Detection and Response in a Single Platform
To effectively fight threats, you need the right tools. The LogRhythm NextGen SIEM Platform aligns your team, technology, and processes. It helps you see broadly across your IT environment, identify threats, and quickly mitigate and recover from security incidents.


LogRhythm’s end-to-end solution helps you uncover threats and minimize your risk though Threat Lifecycle Management (TLM), a detection and response framework for security operations centers (SOCs). TLM enables you to sift through the noise, investigate concerning incidents, and increase your organization’s security maturity.

more >

WhatsUp® Gold

more >

IMPERVA CounterBreach

Imperva CounterBreach protects enterprise data stored in enterprise databases, file shares and cloud applications from the theft and loss caused by compromised, careless or malicious users.

more >

Ricoh Document Security Solutions

The requirements for documents security of Taiwanese businesses have grown from 「image capture backup」to focusing on「audit trail record」. The protection of businesses secrets has evolved from after-the-fact auditing to analyzing and preventing unusual activities in advance of the businesses secrets leaking. Ricoh Taiwan will unveil DocTracker AI during the 2019 Cybersec. Combining Machine Learning, this solution will achieve the ultimate goal of taking preemptive measures to protect business secrets and Ricoh Taiwan will usher in the next era of document security.

more >


more >

HiGuard X

HiGuard X is an all-in-one UTM that operates at gigabit speed up to 1.8 Gbps and carries several main categories across your network security deployments: firewall security protection, policy auditing (anti-virus, In-Line IPS, content filtering, VPN bandwidth, and authentication), and easy management (wireless AP control, bulletin board and Co-Defense). The web-based interface provides friendly and consistent user experience, auto firmware update, and multi-languages supported. Configuration files can be imported and exported directly to and from HiGuard X. By simply plugging in a USB modem into HiGuard X, wireless 3G, 4G/LTE are supported to offer secure and uninterrupted WAN connectivity.

more >