TOGETHER, WE

RESPOND

FASTER

CYBERSEC 2019

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

ALog Series - Securing your business property against threats, including cyber attacks or inside breaches.

  In light of the sophistication and evolution of cyber attacks and diversifying insider breaches, “log management” is absolutely critical for information systems. Pinpointing key points of when/who/what not only provides clues to uncovering wrongdoings but also facilitates the implementation of preventative measures. Accurate record keeping also helps in tracking the past data without which we would know nothing. Log collection and utilization are the most basic best practices for security. Data logs collected today may have a great influence on the resolution of future incidents/accidents.

ALog ConVerter
Centralization of all data into a single, secure location immediate and intuitive pull-out of all essential items.
  ALog ConVerter centralizes logs in file servers storing important enterprise data and analyzes complex system logs with our proprietary logic and converts them into readable access logs. Using this converted log data enables a clear understanding of access activity, intuitive searches and reports via a web browser, thus facilitating monitoring and protecting enterprise-critical data.

ALog ConVerter DB
Protecting your database – Monitoring access to valuable data actions taken by DB administrators.
  Incidents or accidents such as data leaks and falsification can badly damage your organization. With its focus on database activity, ALog ConVerter DB is an access log management tool that enables users to monitor “when, who and what” with regard to critical data including customer information.

ALog EVA
Manage and monitor your logs from various perspectives - ranging from network devices to web servers
  ALog EVA is an integrated log management tool; helping you discover visits to career sites via Web proxy or monitor workers’ excess overtime from time cards, so as to uniformly manage all records of activity.

Resource Athlete
  Resource Athlete is a full-featured server management tool, providing a comprehensive visual insight into server resources including change and management of Folder Access privileges or sweeping large numbers
of unnecessary files.
 

  • Share:

CYBERSEC 2019 Partners

Endorsed by

行政院資通安全處
經濟部

Organizer

iThome

Co-Organizer

社團法人台灣駭客協會

Premiere Technology Partner

台灣思科系統股份有限公司

Strategic Technology Partner

奧義智慧科技股份有限公司

Diamond Sponsor

中華電信股份有限公司
CHT Security 中華資安國際
精品科技股份有限公司

Platinum Sponsor

台灣國際商業機器股份有限公司
漢領國際有限公司
台灣微軟
Splunk

Gold Sponsor

惠普科技
商丞科技股份有限公司

Exhibitor

Consulting Partner

勤業眾信聯合會計師事務所

Supporting Association

中華民國電腦稽核協會
亥客書院
財團法人資訊工業策進會
財團法人國家實驗研究院國家高速網路與計算中心
財團法人中華民國國家資訊基本建設產業發展協進會
美商國際半導體產業有限公司台灣分公司
Students’ Information Technology Conference
臺灣學術網路危機處理中心
台灣資通產業標準協會
台中市電腦商業同業公會
財團法人電信技術中心
台灣電腦網路危機處理暨協調中心
台灣數位安全聯盟
臺灣電腦安全事件應變中心
國立成功大學資通安全研究與教學中心

Media Partner

Equipment Sponsor

台灣三星電子股份有限公司
維嘉全球科技股份有限公司

Cyber Taiwan Pavilion

Endorsed by

經濟部

Organizer

工業局
iThome

Co-Organizer

工研院

Supporting Association

資策會

Cyber Taiwan Pavilion Exhibitor

社團法人台灣駭客協會
中華資安國際
奧義智慧科技股份有限公司
精品科技
詮睿科技股份有限公司