PARTNER
NEITHNET 騰曜網路科技
NEITHNET 騰曜網路科技
+886-4-23270003

Navigator.Efficiency.Intelligent.Technology.Hope

NEITHNET is composed of a group of experts passionate in information security who specialize in advanced insights into hidden cyber threats and are highly familiar with the offensive and defensive language of the future world. On a daily basis, our world-class information security laboratory (NEITHCyber Security Lab) processes huge amounts of information from all sources; just when you feel like you’re searching for clues like a needle in a haystack, we ‘ve already discovered the threat way ahead of time. NEITHNET's service scope is centered on cyber threat intelligence and extends to MDR real-time monitoring, network traffic analysis , dns security, information security diagnostics, and various information security incident processing and forensic services, etc., helping customers guard against ubiquitous cyber threats.

Product Type

  • Network Traffic Analysis
  • Threat Intelligence
  • Managed Detection Response
  • DNS Security
https://www.neithnet.com/zh/
SPEECH
05/09 (Tue.) 14:00 - 14:30
Decrypt! Apply Online Gaming Cybersecurity Experience to Build a Highly Resilient Enterprise Cybersecurity Environment.

Do you know that cybersecurity in online gaming is much more complex than you imagined? With high cybersecurity risks, how does the online gaming industry protect itself against hacking?

This session will share how the online gaming industry responds to constantly evolving cybersecurity attacks around the clock. It will also provide guidance on how to apply these experiences to create a resilient cybersecurity environment for general business operations.

More
NEITHNET CEO
  • TOPIC
    Tech Briefing
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Threat Detection & Response
    Unified Threat Management
05/11 (Thu.) 15:45 - 16:15
Reveal the Hidden Threat! Don't let your internal network be vulnerable and become an easy target.

Following a ransomware attack, many companies find it challenging to detect and respond to the attack effectively. This session will explore various tools and methods that can be utilized to fully detect hackers' behavior, movements, and scope of penetration and show how companies can employ comprehensive security detection tools to thoroughly examine the cloud, network, and endpoints one-by-one, locate the paths of threat invasion and the scope of dissemination, and propose a new security architecture to ensure complete defense and prevent secondary ransomware attacks.


More
NEITHNET Technical manager
  • TOPIC
    Zero Trust Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2 7F
  • TAGS
    Threat Analysis & Protection
    Threat Detection & Response
    Threat Hunting
VIDEO