CYBERSEC EXPO 2019
The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security
MAR.19 - 21
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
We are specializing in core and operating systems and the crime analysis of multi-task platforms, application behaviors and communication protocol. We have obtained Taiwanese and European Union patents. We have successfully assisted more than one thousand companies in building security fortresses.
President Chih-Wen Cheng has a Ph.D. in mathematics from Carnegie Mellon. He specializes in systems security infrastructure, big data analysis, and self-learning AI. His published papers are located with the Archive for Rational Mechanics and Analysis, and have been awarded by the Society for Industrial and Applied Mathematics for being one of the leading papers it its appropriate field.
Taiwan’s strongest APT l BEC information center
Instant traceback tracking of malicious threat communication behavior analysis
Technological Adavantage Instant traceback tracking of malicious threat communication behavior analysis.
15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.
30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.
Instant traceback tracking of malicious threat communication behavior analysis
APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.
Nex-gen AI unknown malicious threat program behavior analysis
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including
Next-gen AI unknown malicious threat program behavior analysis
APT attack connection counter - Double verification whitelist
Proactive analysis of spammer communication behaviors
Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.
Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.
Complete and multi-function organizational reporting
SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.
SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.
Forensic Report
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
DLP Trade secrets and personal information
Drip leakage prevention and data encryption protection
Email remains a vital tool for communications
between modern business transactions
Based on corporate secrecy protection and compliance, such as national personal data protection laws (EU GDPR, ISO27001, BS10012, etc.), companies must fulfill and comply with their email filing and auditing Duties.
Enterprise audits are divided into pre-audits and post-audits
The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
The primary purpose of the post-audits are the normal post-management and case-review applications.
BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.
Pre-Audit
excellent risk management tool
Post-Audit
UBA Big Data Behavior Analysis
ELM Lightweight storage of massive data with efficient full-text search
OEA Organizational cloud archiving and quick historic mail query
ELM Massive Data Management
Supports local and network cluster management.
Supports Journal SMTP/POP de-duplication archives.
Supports .eml format (encrypted) storage and multiple restoration methods.
Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
More than 50 attachment formats and 10 million emails searched in 5 seconds.
Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
OEA supports hierarchical organization development, mail preview, and attachment text quick search.
OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.
VigiCrypt Email Encryption Protection
The strongest email encryption gateway ever.
DLP protection and social fraud prevention are the best tools for eliminating fraud.
PDF/ZIP/HTTPS mail and attachment conditional gateway encryption.
Flexible subject marking, compatible with existing systems, attain internal and external control.
Custom and random passwords, password database, extensive editing, personal settings.
Patented SMTP Stream Processing and MTA Transmission Control
OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data
National-Grade Security (download subject/content/attachment/attachment can be read but not downloaded)
Impenetrable Security
Intermediary program list-checking
shut off useless instructions
real-time vulnerability protection
Root PKI/ACL control
(natural persons) certificate digital signature
OTP security authentication
National security grade
data leak prevention with maximum specification DLE dynamic length encryption
Third-party or spontaneous certificate encryption
SSH encrypted connection with zero successful cracks thus far
Flexible Expansion
HA Heartbeat automatic backup and reply
AA SAN cluster anagement
Rsync parameter synchronization
DRBD local and Cyrus remote mailbox synchronization
Multi-domain management and advanced routing
Password policy and online application
Individual permissions for shared contacts
AD/LDAP multiple integration
SQL vacation agent integration
Forceful Innovation
POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).
Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).
Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.
Web Mail Adopts the latest interactive web technology
ActiveSync Compatible standards for synchronizing address book and calendar
Next Generation Cloud Data Center
Virtual mailbox, one mail one file, zero mailbox damage
Mail deduplication, latest mail ID storage and index management technology
Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage
Supports ActiveSync compatible standard sync email, contacts, and calendars
EP newsletter – attain your mission
Excellency oriented delivery, open, and click rate
Effective email marketing
not only ensures that customers receive messages, but also knows what kind of messages customers like.
This way marketing professionals can continue to sell their products and improve marketing performance.
Using the system's unique letter editing mechanism, the general letter content can be converted in to a variety of collection conditions, and various responses can be set in to different points to facilitate analysis and improve email marketing performance.
Can configure the: name; the option to make it as the subscription page; display names on the subscription page (Traditional Chinese, Simplified Chinese, English);
permission (user, group); notes; whether you need to review, assign a reviewer (supervisor, types of supervisors, other custom classification);
notification mailbox, notification mail language;
whether the user can select more, select the upper limit, or cancel the subscription list’s application mode (in accordance with any, in line with all).
Supports inline map transfer link, group-send single-recipient display, content variable replacement, online preview, unsubscribe, scheduled delivery, review. Web version of e-newsletter can display community website sharing links, etc. Supports queued mode delivery, number of re-sends, queue re-send time, DKIM/DomainKeys/SPF domain authentication key, outgoing speed, IP name, network card IP binding, etc.
Source contains the file and the URL. The file format supports
automatic judgment
RFC/822 format (.eml)
MHTML format (.mht, .mhtml)
HTML format (.htm, .html)
ZIP format (.zip, including HTML and image files)
The URL is limited to static web pages;
JavaScript or complex CSS web content may be distorted.
Includes: marketing list, rejection list, test list; users can delete the marketing list from the system; new list fields contain name contact, permissions, and notes; contacts can add new, edit, delete, import, and download template; import formats supported are the .csv format and .txt format; data column symbol supports commas, semicolons, and tabs; fields include mailboxes, display names, company names, titles, and etc.
Query field includes: period (last N day/week/month, from year/month/day to year/month/day), user, subject, audit account, audit result (all, pending reviews, permissions, prohibited); supports comparison methods (partial comparison, full comparison, left-to-left comparison, right-to-right comparison), whether to display “has been deleted.”
The list field contains: the time the letter was sent, the sender, subject, user, auditing supervisor, final decision-maker, audit result, audit opinion, audit time, and delivery status. Delivery status includes: re-editing, test sending, delivery initiation, submit for review, review (whether to agree, review opinion), and deleted.
Query field contains: period (last N day/week/month, period), user (user, group), and newsletter type. List field contains: the user, number of transmissions, number of mailboxes, number of successes, number of failures, number of opened messages, number of clicks, success rate, and failure rate.
Supports custom text and graphical RWD for unsubscribtion Can perform secondary marketing for query results Define recipient behavior scores for profit analysis Integrate APIs with third-party systems Synchronize with CRM Synchronize logs with CRM
Query field contains: the period (last N day/week/month, period), sender, subject; support comparison method (partial comparison, full comparison, left-to-left comparison, right-right comparison). List field includes: marketing activities, subject, number of mailboxes, unsubscribe rate, failure rate, success rate, open rate, click rate, subscription rate. Marketing activity information includes: marketing activities, newsletter type, account number, event time, subject matter, sender, system list, rejection list, other recipients, unsubscribe, total number of recipients, scheduled delivery, and message code. Delivery log display fields include: recipient, sent date, DSN code, delivery result. Query conditions include: support list screening, recipient, filter by delivery results (all, success, failure, queue), opened letters (all, open, unopened), clicked (all, clicked, unclicked).
SpamTrap Mail Threat Defense
MalSnipe Malicious Mail Forensics
LisoMail Mail Collaboration
BestFiler Mail Archive Audit
VigiCrypt Email Encryption Protection
ePromotion Professional Marketing Electronic Newsletter
NetAudit Network Security Audit Management
River Lin Technical Consultant | Deputy General Manager
+886-927-298-706
river@armorxgt.com