Cybersecurity Pavilion

feature

“Industrial Cybersecurity Group” focuses on accelerating the awareness of cyber security protection in all industries, directed by the Industrial Development Bureau, MOEA(IDB). Seven special interest groups (SIGs) were found as the particular domain of Electronic, Machinery, Metal, Textile, Medical care and Internet of Vehicle, represents the conversation and interaction between each line of business in the industry. It is projected to drive collaborative integration across all industries to inspire mutual benefit and win-win situations. Consequently, the pavilion gathers IoT security solutions in various fields, which reveal the intensive enterprise security capability and encourage the collaboration between the domestic and overseas Smart cities, on the way to generate a digital environment with intelligent cybersecurity.

solution

Unique solutions for trustworthy edge intelligence and data privacy
46    0
Other
Unique solutions for trustworthy edge intelligence and data privacy
FiduciaEdge’s software-based solutions, the "Trusted/Confidential Edge Computing Solutions," ensure information security and user privacy in the 5G/AIoT era. In addition to enhancing security in the edge computing landscape, FiduciaEdge’s confidential edge computing solution also protects the privacy of user datasets and AI algorithms at the source. In the confidential edge computing landscape, AI inferencing can be performed under a safehouse environment without the need to disclose raw data, thereby eliminating any potential of data leakage. An added benefit of adopting FiduciaEdge’s software-based solutions is its ease of portability onto any ARM-based embedded platform.
1·2·3 thingsPKI Security EDA Solution
44    0
Other
1·2·3 thingsPKI Security EDA Solution
thingsPKI is a security brand of ECOLUX that has successfully transformed the complex security technologies into 1-2-3 easy-to-adopt solutions, which enhances the security of IoT devices and accelerate their time to market as well. 1 Tool for Security Development  • PiLock 2 Equipments for Secure Manufacturing  • SP-Server  • SP-HSM 3 AIoT Security Services  • DIMS: Device Identity & Management Service  • FEPS: Firmware Encryption & Protection Service  • SOTA: Secure Over-The-Air Firmware Update
SecuTex Car Protection
44    0
Other
SecuTex Car Protection
SecuTex Network Protection records all network packets for inspection on the full-time network activities before and during an incident. Real-time network traffic analysis and suspicious activity alerts can provide notification when intrusions occur. It also provides a single forensic platform that integrates forensic tools for higher efficiency.
CAN OBDII/J1939 Diagnosis Bridge
39    0
Smart Transportation
CAN OBDII/J1939 Diagnosis Bridge
Generally, any OBDII/J1939 related application relies on the specific domain knowledge on the understanding of CAN bus protocol which is proposed by Bosch in 1983. We have been focusing on the CAN bus signal processing for years. The standard sensor data, such as oxygen and temperature, can be read out from a vehicle ECU based on the standard diagnosis process ISO 15675-2 or J1939. Furthermore, the Physical-layer (such as CAN_H shorted to ground) or the Data-Link-layer error during communication can be collected via our specific CAN bus signal processor. In order to meet your preferred applications, we can provide a set of flexible command sets for you to read the OBDII or CAN bus data according to your needs, with efficiency. These applications can be the customized HUD, engine performance log, vehicle diagnosis for maintenance/service, fleet management, or the air pollution monitor. Since we are good at the CAN bus signal processing, we can collaborate with you on the CAN bus related applications. With more than 10+ years experience on the CAN bus application, we can support you on the circuit design, function verification, physical protection, and networking administration on the CAN bus system. We are a group of young talents from university. We came together last year and plan to establish our own start-up. Should your interests extend beyond our products, we will be glad to visit you to further discuss the investment of our team.
HERCULES SecSAM - Security Assessment Management System for OSS
33    0
Other
HERCULES SecSAM - Security Assessment Management System for OSS
HERCULES SecSAM is a Security Assessment Management platform that can effectively solve open-source software(OSS) risk control and Software Bill of Materials (SBOM) management and other complex issues. Utilizing Cybersecurity Bill of Materials (CBOM) as the technical framework for risk assessment, it integrates the third-party software vulnerability reports (such as source code scanning and vulnerability scanning report), the CI/CD tool that interfaces with the problem tracking management system, and allows users to manage, track, and warn, in a more flexible and convenient way on the basis of secure development.
Jrsys IoV Security Solution - V2X
33    0
Smart Manufacturing
Jrsys IoV Security Solution - V2X
1. JRSYS IoV Security 1.1 Authentication 1.2.En/decryption Key Management 1.3. Firmware Update 2. Implement ISO/SAE 21434 3. JRSYS IoV Security Solution, promise : 3.1. Information is encrypted before upload/download 3.2. My car is under my agreement to control 3.3. Secure firmware update and command execution
Trend Micro Connected Car Security – Securing the ever-changing world of mobility
32    0
Other
Trend Micro Connected Car Security – Securing the ever-changing world of mobility
Take advantage of integrated protection for vehicles, the network, the cloud, and the VSOC. With a solution that covers the comprehensive ecosystem, you have effective protection and a complete view of your security posture. Powered by threat intelligence built over 30+ years, our mobility security solutions secure from the vehicle, to the network, to the back end, and support the VSOC to address your unique requirements. Because of emerging technologies, connected car security requires continuous R&D. Our strong financial background enables us to support your security needs long term, and our work with industry leaders allows us to research and develop solutions tailored fit your needs.

Exhibitors

HwaCom Systems, Inc.
Jrsys International Corp.
ECOLUX Technology
CHT Security Co., Ltd.
Trend Micro Incorporated
FiduciaEdge Technologies Co. Ltd.
Southern Taiwan University of Science and Technology
Kingwaytek Technology Co., Ltd.
Onward Security
TOP