CYBERSEC EXPO 2019
The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security
MAR.19 - 21
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Applicure Technologies Ltd. founded in 2004 in Israel. Focusing on website service security, and specializing on behavior pattern recognition and attack techniques of hackers. They continuously update professional knowledge and technology every year. dotDefender is known for behavioral database and supports a variety of server architectures and OSs. It accurately identifies hacking attack techniques and adjusting security settings according to website services. Blocking hackers immediately and protecting websites from being hacked. Pumo Network Digital Technlogy Co.,Ltd is authorized agent in Taiwan.
Regardless of the website scale, the vulnerabilities in the website programs are fatal threats to the enterprises. The hackers keep seeking for the vulnerabilities in the website programs. dotDefender uses a variety of program engines which Pattern Recognition, Signature Knowledgebase, Data Leak Prevention, and Upload Inspection included to detect and prevent hacking attacks. dotDefender is the most suitable solution for the Web Application Security. It provides powerful and proactive security protection for websites and web applications.
Database Application Firewall integrates Data Auditing, Data Security, and Data Masking, these main functions. It provides comprehensive security protection for the database to minimize the leakage possibility of confidential information of enterprise by Data Auditing in advance, Data Security immediately and Data Masking in the after. And it could also be integrated with third-party security management (SIEM) systems. Database types supported: MySQL, MsSQL, Oracle, IBM DB2, MariaDB.
Up to 90% of websites are hacked without being awareness about it. Hackers hack the websites to steal data and implant malwares. The goodwill of company might be ruined and you have no idea about is totally. Vulnerability Assessment takes different hacking ways to find out different website vulnerabilities by imitating the hacker behavior. During the process, it won’t affect website performance. By using automatic tool to scan website, we will give you the vulnerability report in detail to list security concerns. The software will be updated or upgraded according to the TOP 10 security vulnerabilities listed by the OWASP every year to strengthen the security of websites.
The cloud hosting is developed by R&D departments in PUMO based on three core ideas, effective, stable and security. The enterprises could use high specification cloud hosting by renting instead of buying. You don’t need to buy the servers, you don’t need to build systems and you don’t need to hire MISs to manager it. Concatenating to the TOP 3 ISPs, hence you don’t be afraid of being disconnected. With a backup architecture, you don’t be worried about server malfunction. With load balance, you don’t be worried about the over loading. Your website will always be available anytime. We value cyber security more than you.
Today’s commercially-motivated hackers are targeting the valuable data on corporate Web servers.
Skillfully crafted attacks penetrate unprotected sites without leaving a trace, stealing financial data,
such as credit card numbers, and other personal details. How can they be stopped?
Thomas Chao / CTO
+886-2-8226-9123 #782
thomas@pumo.tw