CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

黃金級

Zero One

Established in 1980, Zero One Technology is devoted to the development of distribution channel for enterprise IT equipment with software and hardware offerings in system management, information security, network equipment, storage, backup/restore, virtualization, video monitoring, cloud services, big data and AI. Zero One is one of the top 500 service companies nominated by Common Wealth Magazine, and is the leader in the top 50 best providers of IT equipment and services. Based on its philosophy of professionalism and excellence, Zero One is committed to being the first choice of enterprise solution provider.

Cloud SecurityAnti-malwarePhishing

Enterprise Threat Protector (ETP)

Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and defend against targeted threats using Domain Name System (DNS) such as malware, ransomware, phishing, and data breaches. Enterprise Threat Protector leverages the real-time intelligence provided by Akamai Cloud Security Intelligence and Akamai's proven, recursive DNS platform around the world to deliver security, control and visibility to your business while easily integrating with your existing network defenses.

Data SecurityContent SecurityCompliance

SafeNet KeySecure

SafeNet KeySecure from Gemalto is the industry’s leading centralized key management platform, and is available as a hardware appliance or hardened virtual security appliance. By utilizing SafeNet KeySecure, organizations benefit from its flexible options for secure and centralized key management – deployed in physical, virtualized infrastructure, and public cloud environments.

Only Gemalto can deliver key management appliances across FIPS-validated hardware or a virtual appliance with a hardware root of trust using SafeNet Hardware Security Modules or Amazon Cloud HSM service.

ComplianceContent SecurityData Security

SafeNet Tokenization

SafeNet Tokenization from Gemalto protects sensitive information by replacing it with a surrogate value that preserves the length and format of the data. The solution tokenizes numeric and alphanumeric data and returns tokens in an unlimited number of formats.

SafeNet Tokenization is used to address a wide range of use cases, including:

  • Securing primary account numbers to achieve PCI DSS compliance
  • Protecting personally identifiable information (PII) and other sensitive data
  • Big data protection
  • Scenarios that require static data masking or the exposure of production databases to non-production environments, such as testing, development, staging, research, and more.
Data SecurityComplianceContent Security

SafeNet ProtectFile: Enterprise File Encryption

SafeNet ProtectFile provides transparent and automated file-system level encryption of sensitive data in the distributed enterprise, including Direct Attached Storage (DAS), Storage Area Network (SAN), and Network Attached Storage (NAS) servers using CIFS/NFS file sharing protocols.

Our enterprise file encryption solution secures unstructured data on servers, such as credit card numbers, personal information, logs, passwords, configurations, and more in a broad range of files. Examples include word processing documents, spreadsheets, images, database files, exports, archives, and backups, and big data implementations. SafeNet ProtectFile can be deployed across on-premises, virtual, public cloud, and hybrid environments.

Cloud SecurityComplianceContent Security

SafeNet KeySecure ProtectV

Cloud Data Protection at Its Best
The industry's first comprehensive cloud data protection solution, SafeNet ProtectV enables organizations to securely migrate to the cloud, encrypt entire virtual machine instances and attached storage, control access to data in the cloud, and address industry security standards and regulations.

    Product Type

    Cloud SecurityAnti-malwarePhishingData SecurityContent SecurityComplianceComplianceContent SecurityData SecurityData SecurityComplianceContent SecurityCloud SecurityComplianceContent Security