CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

白金級

JSLead

JSLead Co., Ltd., founded in 2004, specializes in the distribution of cutting-edge cybersecurity and virtual computing solutions.  Product line includes  ObserveIT - Insider Threat Management, LogRhythm - Next-Gen SIEM, Thycotic - Privileged Access Management, Ericom Shield - Secured Browsing, NComputing – VDI, and many others.  All world-class and award-winning solutions with innovative technologies recognized by leading research organizations and well-known publications, such as Gartner, Cyber Defense Magazine. 

 

JSLead strongly believes in practical IT/Security investment with best prices/performance ratio and low maintenance cost while helping Taiwan customers to achieve their cybersecurity protection objectives and missions.  JSLead has built superior product arrays and wide spectrum customer base in Taiwan including finance, telecommunication, high-tech, government, and other industries.  Integrity, Proactive, Positive and No Excuses are the enterprise motto. 

Insider ThreatData Loss PreventionBehavioral Analytics

ObserveIT

ObserveIT – Insider Threat Solution for Detection, Investigation, Prevention and Analytics

Threat IntelligenceArtificial IntelligenceThreat Hunting

LogRhythm

LogRhythm - NextGen SIEM Platform

Privilege ManagementAuthenticationPassword Management

Thycotic

Thycotic – Privileged Access & Password Management Solution

Web SecurityRansomwareZero-day Vulnerability

Ericom Shield

Ericom Shield - Remote Browser Isolation and File Sanitization

ObserveIT – Insider Threat Solution for Detection, Investigation, Prevention and Analytics
LogRhythm – NextGen SIEM Platform
Thycotic – Privileged Access & Password Management Solution
Ericom Shield – Remote Browser Isolation and File Sanitization

  • Building a Strategy for the Post-DLP World

    A whopping three million electronic records are stolen every single day. Data loss is a big problem, and has been ever since the dawn of the internet. The magnitude of the problem increases every day, as unstructured data grows—currently at a rate of 62% per year. Additional complexities related to data protection arise when organizations need to comply with standards like the new EU GDPR, SOC 2, PCI DSS, and industry-specific standards like HIPAA.

  • 2018 Cybersecurity: Perceptions & Practices - A Benchmark Survey of Security Professionals in the U.S., U.K., and Asia-Pacific Regions

    We established a wide perception of information security programs and initiatives among our surveyed IT decision makers. Our survey includes confidence levels in decision makers’ ability to detect and respond to threats, their preferred security technologies, and some of the biggest challenges to a successful security program.

  • The Top 5 Privileged Account Security Reports CISOs Live for

    Hackers today are targeting your privileged account credentials for good reason. Once they gain access, they can advance from an initial breach, escalating their privileges and moving through your network to identify and compromise confidential information. Hijacking the privileged credentials of an authorized user, an attacker can easily blend in with legitimate traffic and be extremely difficult to detect.

  • Choosing the best enterprise malware protection For your business

    Many security breaches are the result of malware. Hence, effective enterprise anti-malware solutions are an obvious first step to securing your business against attack. Choosing the best enterprise anti malware protection from the plethora of options available may seem like a daunting task – but it doesn’t have to be difficult.

Tell a better security story with ObserveIT

ObserveIT’s insider threat management solution arms security teams with the ability to detect insider threats, streamline the incident investigation process, maintain regulatory compliance, and prevent data loss, in one easy-to-use interface.


Optimize the Efficiency of your SOC with Built-In Playbooks | LogRhythm Demo

Your team is overwhelmed. And you’re worried that potential security events are being overlooked or mishandled — meaning a breach could be imminent. With LogRhythm, you can enhance analyst incident response capabilities and improve the efficiency of your SOC, effectively maximizing available resources.


Thycotic’s Privileged Access Management Tools for IT Security and IT Ops

Thycotic, a global leader in cybersecurity, is the fastest growing provider of Privileged Access Management (PAM) solutions. Thycotic enables you to minimize privileged credential risk, limit user privileges, and control applications on endpoints and servers. Thycotic’s award-winning PAM solutions simplify and improve cybersecurity, reduce costs, enhance productivity, and help achieve compliance for more than 7500 organizations worldwide, including Fortune 500 companies. Thycotic was founded in 1996 with corporate headquarters in Washington, D.C. and global offices in the U.K. and Australia.


Ericom Shield Remote Browser Isolation - Demo Video

Ericom Shield® is an innovative solution that isolates all web content from endpoints and networks while enabling users to browse the websites that they need with no interference.

Watch this video to see how Ericom Shield helps organizations provide seamless, secure browsing that protects endpoints, as well as the organizational network, against known and unknown browser-borne threats including malware, ransomware, drive-by downloads, malvertising and more.


Product Type

Insider ThreatData Loss PreventionBehavioral AnalyticsThreat IntelligenceArtificial IntelligenceThreat HuntingPrivilege ManagementAuthenticationPassword ManagementWeb SecurityRansomwareZero-day Vulnerability