CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

Tachun

Tachun Info

Booth Number:F20&B12

"The information security landscape is vast and ever-changing, and cyber attacks are becoming more and more sophisticated. Tachun stands side by side with our clients to grow and fight. With years of experience in cybersecurity field, we are committed to ""planning and implementing the solutions best-fit for our clients"". We are not only a partner of leading brands in various fields, but also providing local technical service support, with the mission of protecting our clients' cyber hygiene.

Our professional team has extensive experience in information security and has been certified by international information security brands for our localized support. We work hand in hand with corporates to build layers of impenetrable information security defense. Tachun not only helps companies grasp the latest information security trends, but also provides a solid backing for cybersecurity products and services. We are devoted to strengthening the defense posture of our clients and ensuring the comprehensive protection of their assets.

Contact Representative

前往https://ccmsassets.ithome.com.tw/2022/3/7/7311b96f-1620-4bf2-95f2-b29ed796b910.png

Products

Proofpoint Advanced Threat Protection
Proofpoint Advanced Threat Protection

These new threats call for a new, integrated approach to cybersecurity. To protect your people, data, and brand, today’s defenses must work where your people do. That means on and off your corporate network, across a wide mix of technologies, and through new communications channels. 

Proofpoint helps you protect the way your people work by detecting and managing advanced threats and compliance risks. Our advanced threat solutions work across email, mobile apps, and social media to help safeguard what matters most. We protect your critical information and equip you with the right intelligence and tools to respond quickly when things go wrong."

Advanced Threat Protection
Netskope Security Cloud
Netskope Security Cloud

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks.

Cloud Security
CybereasonXDR Platform
CybereasonXDR Platform

The Cybereason XDR Platform moves beyond endless alerting to instead recognize, expose, and end malicious operations before they take hold. Using one agent, one console, and one team to defend all endpoints, the AI-driven Cybereason XDR 

Platform was designed to expose and intercept every MalOp (malicious operation). 

A MalOp is not an alert, but a contextualized view of the full narrative of an attack. Only Cybereason provides the actionable intelligence to outthink the adversary, the remediation speed to outpace their operations, and the insights to end any attack.

Extended Detection and Response

Solutions

APT Protection, Email Security, Insider Threat Management, Managed Detection & Response

WORLD-LEADING CYBERSECURITY SOLUTIONS

With years of experience in Cybersecurity industry, Tachun keeps providing world-leading cybersecurity solutions and services to clients, seeking integrated solutions in the goal of developing a cyber-resilience structure against growing targeted attacks and sophisticated threats.

INTEGRATED SOLUTIONS

Prioritizing on enhancing clients’ enterprise cyber-resilience as one of business objectives, Tachun not only resells well-developed solutions, but actively focuses on and develops a better service and technical support. With comprehensive cybersecurity consulting service and experience, Tachun provides localized supports in Taiwan and works along with clients on their digital transformation journey.

PROFESSIONAL SERVICE

In Tachun are a group of experts with solid experiences in cybersecurity field, with knowledges in cybersecurity, information technology system consulting, software developing and more, with one and the only purpose of helping clients to build up a stronger cyber defense against attackers."


White Papers

2022 State of the Phish Report
2022 State of the Phish Report

Proofpoint eighth annual State of the Phish webinar for an in-depth look at the latest threat landscape, including phishing, business email compromise and ransomware attacks.

下載
The Human Factor 2021
The Human Factor 2021

Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World

As the global pandemic upended work and home routines in 2020, cyber attackers pounced. Dive deep into how this extraordinary time has changed the threat landscape—and what it means for the year ahead. Our premiere threat report draws from one of cybersecurity's largest and most diverse data sets to explore user vulnerability, attacks and privilege through a people-centric lens. You'll learn:

  • How ransomware activity has evolved
  • The latest techniques and tactics used in attack campaigns—and why they work
  • How nearly every threat actor we track piggybacked the pandemic to target people
  • Why business email compromise is so effective and costly
  • Which threat actors persuaded more people to click
下載
Ransomware Survival Guide
Ransomware Survival Guide

Be Ready for Ransomware

Ransomware is an old threat that just won't go away. While overall volumes have fallen from their peaks a few years ago, today's ransomware attacks are more targeted, more lucrative for attackers and more potentially damaging to your organization. Learn what to do before, during and after a ransomware attack with the 2022 Ransomware Survival Guide. You'll learn:

  • How ransomware works, and how it is changing
  • Preventative measures every organization can take
  • The first thing security teams should do if ransomware infects users' systems
  • Whether you should pay the ransom—and when not to
下載
Upgrade Your Secure Web Gateway - Next Generation of Secure Web Gateways
Upgrade Your Secure Web Gateway - Next Generation of Secure Web Gateways

Ensure your secure web gateway (SWG) can decode the latest cloud services and web traffic to deliver the visibility and context you need to enforce granular policy controls that protect your data and operations.

下載
First Generation CASB - Take a Step Up Beyond First Generation CASB
First Generation CASB - Take a Step Up Beyond First Generation CASB

Modern CASB vendors like Netskope have evolved from first generation CASBs that were architected primarily to discover cloud services and provide limited API-only controls. A modern CASB cloud security architecture consists of real-time traffic inspection of all enterprise traffic, ensuring that real-time, granular visibility and control is provided for both managed and unmanaged cloud applications so enterprises can safely enable the cloud instead of being forced to block it or simply monitor it.

下載

Videos

Proofpoint: Protecting your most valuable assets

Cyber criminals know the easiest way into your business is through your people. Proofpoint is an industry-leading security company that provides a unique, people-centric approach to cybersecurity. See how Proofpoint’s multi-layered security strategies and solutions are designed to protect your people and prevent attackers from gaining access to your networks, resources, and IP.