CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

黃金級

HwaCom

HwaCom Systems Inc. is established in 1994. With the mission of "Bring Broadband Digital Life to You ", HwaCom is the leading broadband system integrator and supplier of mobile, fixed and IP networks related services as well as multimedia application in Taiwan. In addition, HwaCom has partnerships of major international leading IT and Network companies, can provide most comprehensive broadband application integration services covered Telecom, Media, government and Manufacture industries from infrastructure to application to fulfill the requirement of enterprises and government services in Taiwan.

Managed Security ServiceSecurity OperationIncident Response

HwaCom Security Management Services

With the advent of the era of IOT networking, the issue of security has surpassed the IT (MIS) level has become a "business risk", This has caused the company to suffer significant losses such as income, competitiveness and company's reputation. However, it is undoubtedly full of challenges to protect itself. Due to a large number of IOT devices, not only the intrusion points are increased, the defense boundaries are expanded, but also the soft firmware update and management are not easy, and the existing security equipment does not cooperate with each other. It is feared that companies will lack visibility of security and will not be able to properly prioritize defenses.Focusing on the threat of IoT equipment, the threat of enterprise protection should be evolved as soon as possible. It is not appropriate to stay in the past to set up multiple devices, write multiple specifications, but neglect to check whether it is implemented or not, it is necessary to define its own important Assets, a thorough understanding of the background of key assets and services, will be able to establish a monitoring mechanism based on this, and be able to accurately identify various normal or abnormal patterns at any time, and finally to the strength of active protection. The main connotation of active protection is similar to the PDCA management cycle. Enterprises first develop KPIs and then based on two major aspects: active attack and strong fortifications. Use SIEM and deep packet analysis systems to detect suspicious activities, and then use firepower to counter and delay each other's speed. It is difficult for hackers to make progress, and finally, based on the clues found, invest resources to implement customized protection measures, and through this evolutionary cycle, continuously strengthen their own fortifications.

Managed Security ServiceSecurity OperationIncident Response

HwaCom MSS

The issue of information security is not born now, and it has evolved many times from the past to the present. At the beginning of the period, including anti-virus, firewall, Web, E-mail and other gateway protection, all focused on a single point of protection, a device represents a defense function; later, with the advent of malicious attacks, coupled with the rise of the Internet, the network devices surged, The number of hackers has increased, and the single-point defense is not enough. As a result, the concept of collaborative defense is raised, and the information is exchanged through different types of gateway devices, and then combined with cloud, endpoint and other protection mechanisms to form a joint defense network.
In view of this, HwaCom big data platform for the conduct underlying the development of value-added, and carries out the majority of enterprises to meet the anticipated war intelligence center to help businesses keep abreast of the status of information security, in the moment of the event, send an SMS, App push Or E-mail and other pipelines to provide warnings to help managers know what the current situation of the security and what should be disposed of. Through customization, the corresponding instructions can be issued according to the threat type and policy to the relevant security equipment, and the initiative will be blocked.
In the era of IoT, more and more devices have IP , and they all have the ability to connect to the Internet. For example, in the office, PCs, IP phones, printers, IP cameras, and even punch-clock can all be connected. The intrusion point of malware may also become an accomplice to horizontal spread infection. Therefore, in addition to the protection of the network ( north-south direction), enterprises must also pay attention to the protection of physical devices and internal network behaviors, and establish east-west defense as soon as possible. The emergence of a new generation of Security Dashboard of Hwacom helps enterprises to resist stubborn malicious attacks, firmly guard digital assets, keep pace with the times, adapt to the evolution of security, and quickly establish the corresponding supply of security services. Nowadays, they work with the vendor who has AI analysis on network and endpoint to gather together as a strong security defense fortress.

Information security management services/Intelligent Managed Security System

    Product Type

    Managed Security ServiceSecurity OperationIncident ResponseManaged Security ServiceSecurity OperationIncident Response