CYBERSEC EXPO 2019
The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security
MAR.19 - 21
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Today's fast-moving digital environment enables enterprises to operate more efficiently, gain competitive advantage and serve customers better than ever before. It also multiplies the security risks.
nCipher Security’s cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates. Using the same proven technology that our customers depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical information and applications, ensuring the integrity of your data and putting you in complete control – today, tomorrow, and at all times.
The nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.
nShield Connect-Network-attached appliances
nShield Solo-PCIe cards for embedding in appliances or servers
nShield Edge-Portable USB-based modules
nCipher Security’s nShield Hardware Security Modules (HSMs) are hardened, tamper-resistant devices that protect your company’s most sensitive data. These FIPS 140-2 certified modules perform cryptographic functions such as generating, managing and storing encryption and signing keys, as well as executing sensitive functions within their protected boundaries. A powerful addition to your security stack, nShield HSMs help you to: achieve higher levels of data security and trust, meet and exceed important regulatory standards, maintain high service levels and business agility.
The Internet of Things requires security and trust in order to reach its full potential. The explosion of the IoT introduces significant opportunities – as well as potential threats. nCipher’s nShield HSMs, combined with supporting security applications from nCipher Technology partners, enable manufacturers to provide each device a unique ID using the strongest cryptographic processing, key protection, and key management available. The solution include device authentication, code signing and manufacturing security.
With nShield Bring Your Own Key (BYOK), you bring your own keys to your cloud applications, whether you’re using AWS, Google Cloud Platform (GCP) or Microsoft Azure. nShield high-assurance HSMs let you continue to benefit from the flexibility and economy of cloud services while you strengthen the security of your key management practices and gain greater control over your keys.
Want to take advantage of the flexibility, convenience and savings of cloud-based technology while maintaining exclusive control over your sensitive data? You can! Thales e-Security and Microsoft innovative “Bring Your Own Key” (BYOK) solution puts you in control to secure your data in the cloud.
As connected devices continue to expand into the mainstream, the digital transformation is all around us. A PKI with a HSM root of trust enables you to issue device credentials so you can validate the identity of your connected devices and the integrity of the data they collect.
CipherTech Co., Ltd.(Agent)
Tel : +886-2-27992800
E-mail : sales@ciphertech.com.tw