CYBERSEC EXPO
NEITHNET 騰曜網路科技
+886-4-23270003

Navigator.Efficiency.Intelligent.Technology.Hope

NEITHNET is composed of a group of experts passionate in information security who specialize in advanced insights into hidden cyber threats and are highly familiar with the offensive and defensive language of the future world. On a daily basis, our world-class information security laboratory (NEITHCyber Security Lab) processes huge amounts of information from all sources; just when you feel like you’re searching for clues like a needle in a haystack, we ‘ve already discovered the threat way ahead of time. NEITHNET's service scope is centered on cyber threat intelligence and extends to MDR real-time monitoring, network traffic analysis , dns security, information security diagnostics, and various information security incident processing and forensic services, etc., helping customers guard against ubiquitous cyber threats.

Product Category

  • Network Traffic Analysis
  • Threat Intelligence
  • Managed Detection Response
  • DNS Security
  • Secure Remote Access
https://www.neithnet.com/zh/
PRODUCTS
Network Traffic Analysis
NEITHViewer
Threat Intelligence
NEITHInsight
Managed Detection Response
NEITHSeeker
DNS Security
NEITHDNS
Secure Remote Access
SPEECH
5/14 (Tue.) 16:30 - 17:00

Intelligent management of enterprise internet access, observing hackers' every move from external to internal perspectives.

Technical manager / NEITHNET
  • TOPIC / TRACK
    Brand Day - uniXecure
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2
    7F 701A
  • SUBTOPIC
    APT
    Mobile Security
    Cyber Hunting
5/15 (Wed.) 14:45 - 15:15

Currently, most network defense architectures primarily focus on detecting north-south network packet behavior. However, detecting east-west lateral network flow has always been a headache for IT professionals. This allows hackers to exploit this weakness, making it easy for them to infiltrate and spread within internal networks and locate critical targets without being easily detected. This session will share insights on leveraging network behavior analysis and monitoring from a blue team perspective to quickly identify hacker attack traces and problematic computers or devices.

CEO / NEITHNET
  • TOPIC / TRACK
    Zero Trust Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2
    7F 701F
  • SUBTOPIC
    Threat Analysis & Protection
    Threat Detection & Response
5/16 (Thu.) 10:15 - 10:45

Ransomware crime syndicates are targeting enterprises for extortion, leaving everyone vulnerable. Ransom incidents have become routine, so how can we detect signs before significant harm is done? There are always precursors before ransomware truly impacts a company. This session will lead us from a blue team perspective to identify the signs of ransomware attacks. By recognizing these indicators early, we can mitigate the damage before it becomes severe.

Senior Engineer / NEITHNET
  • TOPIC / TRACK
    Ransomware Solution Forum
  • LOCATION
    Taipei Nangang Exhibition Center, Hall 2
    7F 701F
  • SUBTOPIC
    Ransomware
    Threat Detection & Response
    Endpoint Security
TECH DEMO
Decrypt hacker attack methods with NEITHNET's comprehensive solution.
Decrypt hacker attack methods with NEITHNET's comprehensive solution.
Utilizing AI black magic to effectively assist Apache Server in log analysis.
Utilizing AI black magic to effectively assist Apache Server in log analysis.
Is your smartphone secure? Simple tips to determine if your phone has been hacked
Is your smartphone secure? Simple tips to determine if your phone has been hacked
Rapid Learning of MITRE ATT&CK Practical Application from Case Studies
Rapid Learning of MITRE ATT&CK Practical Application from Case Studies
How much time do you have left for cybersecurity maintenance amid daily operations, maintenance, and project deployments?
How much time do you have left for cybersecurity maintenance amid daily operations, maintenance, and project deployments?
How to protect your website users from malicious attacks such as XSS and CSRF?
How to protect your website users from malicious attacks such as XSS and CSRF?
Booth Activity
si̍p-pat-á!
si̍p-pat-á!
RESOURCE CENTER
NEITHNET