CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
Deepfake AI Recognition
Ultimate Security · World's Strongest
ArmorX, founded in the year 2000, is a leading developer and manufacturer in the field of 'Intelligent Protection · Cybersecurity Defense and Communication Collaboration.' The operational model encompasses cloud services (SaaS), dedicated hardware (Appliance), software (Software), and virtualization (VM).
Dr. Cheng Chihwen, President and Chief Technology Officer of ArmorX, holds a Ph.D. in Applied Mathematics from the prestigious Carnegie Mellon University (CMU) in the United States. His doctoral thesis was selected as the annual paper in the top journal in the global control field, with over 20 related patents and publications. CMU has consistently ranked first in computer science in the United States for multiple years, making it a leading institution in forward-looking information and cybersecurity technology.
ArmorX independently compiles the highly efficient proprietary ArmorX OS, along with MTA key security and anti-penetration protection technology. It also features a continuously operational DB database, Daeon resident program, anti-penetration intrusion prevention, and the cleaning of over 70 million pieces of intelligence. The solution is powerful, flexible, and finely detailed, earning the trust of numerous cybersecurity-conscious users.
For several consecutive years, ArmorX has passed ISO/IEC 27001:2013 certification, Industrial Bureau APP Security Detection, and its team holds CEH top hacker certification, ISO27001 certification, ISO27701 certification. It has been honored with awards such as the 2022 COMPUTEX TAIPEI First BC Cybersecurity Product Award, Information Month Top 100 Innovative Product Award, and Golden Waves Award.
Technological Adavantage
Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.
Instant traceback tracking of malicious threat communication behavior analysis
APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.
Next-gen AI unknown malicious threat program behavior analysis
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including
Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.
Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.
Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.
Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.
Forensic Report
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
Taiwan’s strongest APT l BEC information center
Instant traceback tracking of malicious threat communication behavior analysis
Technological Adavantage
Instant traceback tracking of malicious threat communication behavior analysis.
15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.
30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.
Instant traceback tracking of malicious threat communication behavior analysis
APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.
Proactive analysis of spammer communication behaviors
Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.
Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.
Complete and multi-function organizational reporting
SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.
SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.
Enterprise audits are divided into pre-audits and post-audits
The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
The primary purpose of the post-audits are the normal post-management and case-review applications.
BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.
Pre-Audit
excellent risk management tool
Legal compliance:pre-configure PII I standard and PII II behavior
Accurate:supports regular expression and program verification, custom exclusion
Completeness:32/64-bit applications, large and multi-blank attachments
Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
Management Report:produce various statistical and analytical reports based on audit and management needs
Post-Audit
UBA Big Data Behavior Analysis
Normal post-audit management:set query conditions, query permissions, and valid period
Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
Mail log:display authentication account and source country code/city, supports forwarding and re-sends
System log:contains core log, authentication log, antivirus log, load log
Security log:record administrator actions, including searches, forwards, and setting changes, etc.
Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports
ELM Lightweight storage of massive data with efficient full-text search
OEA Organizational cloud archiving and quick historic mail query
ELM Massive Data Management
Supports local and network cluster management.
Supports Journal SMTP/POP de-duplication archives.
Supports .eml format (encrypted) storage and multiple restoration methods.
Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
More than 50 attachment formats and 10 million emails searched in 5 seconds.
Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
OEA supports hierarchical organization development, mail preview, and attachment text quick search.
OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.
VigiCrypt Email Encryption Protection
The strongest email encryption gateway ever.
DLP protection and social fraud prevention are the best tools for eliminating fraud.
PDF/ZIP/HTTPS mail and attachment conditional gateway encryption.
Flexible subject marking, compatible with existing systems, attain internal and external control.
Custom and random passwords, password database, extensive editing, personal settings.
ELM Lightweight storage of massive data with efficient full-text search
OEA Organizational cloud archiving and quick historic mail query
ELM Massive Data Management
Supports local and network cluster management.
Supports Journal SMTP/POP de-duplication archives.
Supports .eml format (encrypted) storage and multiple restoration methods.
Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
More than 50 attachment formats and 10 million emails searched in 5 seconds.
Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
OEA supports hierarchical organization development, mail preview, and attachment text quick search.
OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.
Patented SMTP Stream Processing and MTA Transmission Control
OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data
Web Mail Adopts the latest interactive web technology
ActiveSync Compatible standards for synchronizing address book and calendar
Impenetrable Security
Core Operation
Intermediary program list-checking
shut off useless instructions
real-time vulnerability protection
Identity Security
Root PKI/ACL control
(natural persons) certificate digital signature
OTP security authentication
Static Encryption
National security grade
data leak prevention with maximum specification DLE dynamic length encryption
Dynamic Encryption
Third-party or spontaneous certificate encryption
SSH encrypted connection with zero successful cracks thus far
Flexible Expansion
Cluster Architecture
HA Heartbeat automatic backup and reply
AA SAN cluster anagement
Rsync parameter synchronization
DRBD local and Cyrus remote mailbox synchronization
High Efficiency Clustering LDAP
Multi-domain management and advanced routing
Password policy and online application
Individual permissions for shared contacts
AD/LDAP multiple integration
SQL vacation agent integration
Various SOAP (XML) API Interface
Forceful Innovation
Mailbox Service
POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).
Mail Transmission
Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).
Safety Controls
Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.
WebLook Adopts the latest interactive web technology
ActiveSync Compatible standards for synchronizing address book and calendar
Next Generation Cloud Data Center
Excessive capacity!
Virtual mailbox, one mail one file, zero mailbox damage
Efficient space conservation!
Mail deduplication, latest mail ID storage and index management technology
Extreme speeds!
Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage
Mobile business!
Supports ActiveSync compatible standard sync email, contacts, and calendars
Mobile Device
Dedicated APP
Device binding
Data is not available
Email's content, attachments, address book, calendar
Watermark
Email's content, attachments, calendar details
ArmorX Mail Secure Mail System
•Patented SMTP Stream Processing and MTA Transmission Control
•OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data
•Web Mail Adopts the latest interactive web technology
•ActiveSync Compatible standards for synchronizing address book and calendar
ArmorX Spam Spam Mail Defense
•Taiwan’s strongest APT l BEC information center
•Instant traceback tracking of malicious threat communication behavior analysis
ArmorX APT Malicious Mail Forensics
•Next-gen AI unknown malicious threat program behavior analysis
•APT attack connection counter - Double verification whitelist
ArmorX DLP Mail Audit System
•DLP Trade secrets and personal information
•Drip leakage prevention and data encryption protection
ArmorX Archive Mail Archive System
•ELM Lightweight storage of massive data with efficient full-text search
•OEA Organizational cloud archiving and quick historic mail query
ArmorX NAS Extreme security High performance
•Extreme security High performance Environmental factor encryption
•Organization integration, flexible and easy to use, anti-encryption ransomware