CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

BAOYI Information

BAOYI Information

BAOYI 寶誼資訊

BAOYI Information Info

Booth Number:B31

BAOYI Information Co., Ltd. is founded by senior IT Security Experts who work and focus on IT Security Domains for many years.

We earns credits and reputation of partners and customers by our expertise and reliable services quality.

We believe the long term business is based on our enthusiasm to create value, mutual trust and friendship.

前往https://ccmsassets.ithome.com.tw/2022/3/6/ad58e155-8edb-42a3-96d4-83dae280e016.png

Products

CyberArk - Leader in Identity Security and Access Management
CyberArk - Leader in Identity Security and Access Management

CYBERARK(NASDAQ:CYBR) is a leader in identity security and access management, an Israeli company and a US-listed information security vendor. Utilize the most complete and flexible identity security function to protect the access security of any device and any location in a timely manner, which can protect the cloud, infrastructure and the entire development and maintenance process data and assets; provide the industry's most complete solution to reduce the authority Risks posed by credentials and keys.

Access Management
Reblaze-Comprehensive cloud website security solution
Reblaze-Comprehensive cloud website security solution

Reblaze's web security protection platform includes next-generation web application firewall (WAF), network layer and application layer DoS/DDoS attack protection, advanced robot management, web API security, content delivery network (CDN), load balance (LB ), real-time traffic monitoring and management, etc. It is fully integrated with top public cloud service providers (AWS, Azure, GCP), and can be deployed flexibly according to the cloud platform selected by customers.

All customers enjoy all-round protection and have a dedicated virtual private cloud (VPC) to effectively eliminate multi-tenancy loopholes and ensure customer privacy.

Through multi-level threat detection, behavior analysis and automated machine learning, it can accurately identify and defend against new threats, including Profiling, Primary Filtering, Dynamic Filtering, and Biometric Behavioral Analysis , not only the identification of the requester, but also the analysis of its behavior, which can effectively identify legitimate users or complex advanced network robots.

Cloud Security
Ubiq Security-Simple and fast application layer API encryption
Ubiq Security-Simple and fast application layer API encryption

Ubiq's API-based platform dramatically simplifies encryption complexity,with only 2 API calls and 3 lines of code, developers can integrate encryption into any application in minutes. The Ubiq platform saves developers time and improves overall application security by integrating encryption directly into applications.


Encryption
IDSS (Immutable Data Storage System)
NEW IDSS (Immutable Data Storage System)

Write Once Data Storage system- Data once committed (stored) cannot be overwritten, can be read/referred as many times as neeeded. This is the Storage System for Zero Trust Business Era. Protecting Data against Ransomware. Suitable for critical data records such as Credit card transactions, Stock Exchange Transactions, Medical records. Getting ready for the requirements of next generation WW3 to store your creative commits in a tamper proof storage. Implementing efficient power management for reduced power consumption. Multi layer Data protection, device level, system level & file level. Your personal cloud storage solution to store immutable data.


Cloud Security

Solutions

CyberArk - Leader in Identity Security and Access Management

CyberArk Identity Security Solutions Utilize the most complete and flexible identity security functions to protect access security on any device and any location at the right time, including three aspects:

Enforce Privileges:Provides continuous protection and instant access to any identity (human or machine), isolating threats to prevent chaos.

  • Privileged Access Manager:Continuously discover and manage privileged accounts and credentials, isolate and monitor privileged connections, and remediate risky activity across environments.
  • Cloud Entitlements Manager:Continuous use of artificial intelligence to detect and  correct hidden, misconfigured and nused access   permissions across different cloud environments to   improve visibility.
  • Endpoint Privilege Manager:Enforces the principle of least privilege, controls applications and prevents credential theft on  Windows and Mac desktops and Windows servers to  contain attacks.
  • Vender Privileged Access Manager:Enables remote providers to securely access the most sensitive IT assets managed by CyberArk without the use of VPNs, proxies or passwords.


Grant Access:Leverage artificial intelligence to help prevent threats while inviting your employees and customer identities in.

  • Workforce Identity:Give your employees easy and secure access to business resources with single sign-on and multi-factor authentication.
  • Customer Identity:Keep customers loyal to your business by delighting customers with easy and secure access to your applications.


DevSecOps:Adopt and secure modern technologies and evolve trust-based customer experiences at the pace of business needs.

Protect third-party software such as vulnerability scanners, RPA, automation tools, and IT management platforms by managing the credentials needed to get the job done. Protect business system information and simplify operations by securely delivering credentials to large-scale proprietary, mission-critical static applications.

Reblaze

Services include website application firewall, DoS/DDoS protection, advanced robot management, mobile application security, Web API security, content delivery network (CDN), load balancing (LB), real-time traffic monitoring and management solutions WAF/ DDoS/BOT Protection, etc.

API encryption security solution/Encrypted Multicast Solutions

Ubiq's mission is to make encryption simple, take the complexity out of encryption for developers and security teams,enabling developers to easily and quickly integrate encryption directly into applications.

Save developer time and eliminate downstream security costs, enabling organizations to reduce risk and focus time and resources on growing their business.

White Papers

CyberArk Controls Your Business_Protect Your Domain Control Station_Avoid Kerberos Attacks
CyberArk Controls Your Business_Protect Your Domain Control Station_Avoid Kerberos Attacks
下載
CyberArk Ransomware Analysis and Possible Mitigation Strategies
CyberArk Ransomware Analysis and Possible Mitigation Strategies
下載
Reblaze eliminates advanced cyber bot attacks、Comprehensive cloud website security solution
Reblaze eliminates advanced cyber bot attacks、Comprehensive cloud website security solution

Provide a complete website security protection platform, including next-generation web application firewall (WAF), full-scale automatic adjustment blocking/distributed blocking (DoS/DDoS) attack protection, advanced robot management, real-time traffic monitoring management and other functions.


下載
Ubiq Security-Exclusive encryption technical information
Ubiq Security-Exclusive encryption technical information

Share the Elemental Data Protection (EDP) security model. A four-step way to protect any data type.


下載

Videos

Overview of CyberArk Cloud Rights Manager
Reblaze-Comprehensive cloud website security solution
Ubiq Use Case : Integrating data encryption into 2 applications