Cybersecurity Pavilion

feature

“Industrial Cybersecurity Group” focuses on accelerating the awareness of cyber security protection in all industries, directed by the Industrial Development Bureau, MOEA(IDB). Seven special interest groups (SIGs) were found as the particular domain of Electronic, Machinery, Metal, Textile, Medical care and Internet of Vehicle, represents the conversation and interaction between each line of business in the industry. It is projected to drive collaborative integration across all industries to inspire mutual benefit and win-win situations. Consequently, the pavilion gathers IoT security solutions in various fields, which reveal the intensive enterprise security capability and encourage the collaboration between the domestic and overseas Smart cities, on the way to generate a digital environment with intelligent cybersecurity.

solution

Cyber Security Solutions for Smart City Technology Adoption
599    0
Smart Security
Cyber Security Solutions for Smart City Technology Adoption
Smart Cities need to adopt new smart technologies to become smart. Every new technology or urban system gives a new opportunity to cyber attackers.Due to the reliance of various components of smart cities on information and communication technology, cyber-security challenges (such as information leakage and malicious cyber-attacks) in this field affect smart cities behavior. Hwacom provides total cyber security solutions for smart city, such as Information Security Consultant/Testing/Detection/Simulation/Risk Protection, IoT/OT Assets Management/Threat Monitor/Behavior Analysis/Risk Aassessment, and private 5G network security to help customers build smart and secure samrt city.
SecuTex Car Protection
526    0
Other
SecuTex Car Protection
SecuTex Network Protection records all network packets for inspection on the full-time network activities before and during an incident. Real-time network traffic analysis and suspicious activity alerts can provide notification when intrusions occur. It also provides a single forensic platform that integrates forensic tools for higher efficiency.
1·2·3 thingsPKI Security EDA Solution
486    0
Other
1·2·3 thingsPKI Security EDA Solution
thingsPKI is a security brand of ECOLUX that has successfully transformed the complex security technologies into 1-2-3 easy-to-adopt solutions, which enhances the security of IoT devices and accelerate their time to market as well. 1 Tool for Security Development  • PiLock 2 Equipments for Secure Manufacturing  • SP-Server  • SP-HSM 3 AIoT Security Services  • DIMS: Device Identity & Management Service  • FEPS: Firmware Encryption & Protection Service  • SOTA: Secure Over-The-Air Firmware Update
Trend Micro Connected Car Security – Securing the ever-changing world of mobility
485    0
Other
Trend Micro Connected Car Security – Securing the ever-changing world of mobility
Take advantage of integrated protection for vehicles, the network, the cloud, and the VSOC. With a solution that covers the comprehensive ecosystem, you have effective protection and a complete view of your security posture. Powered by threat intelligence built over 30+ years, our mobility security solutions secure from the vehicle, to the network, to the back end, and support the VSOC to address your unique requirements. Because of emerging technologies, connected car security requires continuous R&D. Our strong financial background enables us to support your security needs long term, and our work with industry leaders allows us to research and develop solutions tailored fit your needs.
CAN OBDII/J1939 Diagnosis Bridge
462    0
Smart Transportation
CAN OBDII/J1939 Diagnosis Bridge
Generally, any OBDII/J1939 related application relies on the specific domain knowledge on the understanding of CAN bus protocol which is proposed by Bosch in 1983. We have been focusing on the CAN bus signal processing for years. The standard sensor data, such as oxygen and temperature, can be read out from a vehicle ECU based on the standard diagnosis process ISO 15675-2 or J1939. Furthermore, the Physical-layer (such as CAN_H shorted to ground) or the Data-Link-layer error during communication can be collected via our specific CAN bus signal processor. In order to meet your preferred applications, we can provide a set of flexible command sets for you to read the OBDII or CAN bus data according to your needs, with efficiency. These applications can be the customized HUD, engine performance log, vehicle diagnosis for maintenance/service, fleet management, or the air pollution monitor. Since we are good at the CAN bus signal processing, we can collaborate with you on the CAN bus related applications. With more than 10+ years experience on the CAN bus application, we can support you on the circuit design, function verification, physical protection, and networking administration on the CAN bus system. We are a group of young talents from university. We came together last year and plan to establish our own start-up. Should your interests extend beyond our products, we will be glad to visit you to further discuss the investment of our team.
HERCULES SecSAM - Security Assessment Management System for OSS
458    0
Other
HERCULES SecSAM - Security Assessment Management System for OSS
HERCULES SecSAM is a Security Assessment Management platform that can effectively solve open-source software(OSS) risk control and Software Bill of Materials (SBOM) management and other complex issues. Utilizing Cybersecurity Bill of Materials (CBOM) as the technical framework for risk assessment, it integrates the third-party software vulnerability reports (such as source code scanning and vulnerability scanning report), the CI/CD tool that interfaces with the problem tracking management system, and allows users to manage, track, and warn, in a more flexible and convenient way on the basis of secure development.
Unique solutions for trustworthy edge intelligence and data privacy
452    0
Other
Unique solutions for trustworthy edge intelligence and data privacy
FiduciaEdge’s software-based solutions, the "Trusted/Confidential Edge Computing Solutions," ensure information security and user privacy in the 5G/AIoT era. In addition to enhancing security in the edge computing landscape, FiduciaEdge’s confidential edge computing solution also protects the privacy of user datasets and AI algorithms at the source. In the confidential edge computing landscape, AI inferencing can be performed under a safehouse environment without the need to disclose raw data, thereby eliminating any potential of data leakage. An added benefit of adopting FiduciaEdge’s software-based solutions is its ease of portability onto any ARM-based embedded platform.
WebComm OETH Cloud Identity Solution
274    0
Smart Security
WebComm OETH Cloud Identity Solution
WebComm OETH provides enterprises to easily implement passwordless verification services, improving the passwordless single sign-on experience! With WebComm OETH identity authentication service, users can log in by scaning QR Code with mobile phones using biometric verification. WebComm OETH not only improves the user experience greatly, but also enhances the security of remote working. 4 Features of WebComm OETH identity authentication service: - Information Security: International FIDO verification standard - Low-cost Implementation: With on-demand payments, reducing the cost of maintenance and building - Easy enablement: Easy and fast implementation - Passwordless SSO: Passwordless login access to VPN, VDI, and various enterprise systems
ID Expert IoT-Auth Solution
223    0
Smart Security
ID Expert IoT-Auth Solution
ID Expert Multi-factor Authentication combines with IoT, can be used in daily life, business, and even supply chain. With this technology, Identity authentication can not only apply on computer system, but also on any device like lock or safe-deposit box, and make our lives safer and more convenient.
IoT/OT Security Workshop (PoC)
199    0
Smart Manufacturing
IoT/OT Security Workshop (PoC)
Security threats of IoT & ICS fields are hidden in the dark side of industrial networking. As we move towards Industry 4.0 era, enterprises must have more comprehensive cybersecurity protection from end to cloud. By deploying Microsoft Defender for IoT, an latest IoT network security solution, Freedom Systems helps OT industry to enhance visibility and monitoring of IoT/OT environment and get rid of detected potential threats. - Monitor the entire environment with device inventory to build up visibility - Identify vulnerabilities and weaknesses, detect vulnerabilities in OT or IoT devices and provide recommended security improvements - Catching threats and predicting risks with complete coverage of ATT&CK for ICS architecture, not only catching existing threats, but also predicting potential risks
MailCloud Workplace
153    0
E-Office
MailCloud Workplace
工作專用更能做好安控,Email, 即時對話, 視訊會議一次到位! MailCloud 為 Openfind 推出的企業雲端服務品牌,國際資訊安全 ISO27001 認證,提供客戶 One-Stop Shopping 的工作溝通套餐方案與全方位辦公室生產力服務,包含「雲端信箱、郵件安全、稽核歸檔、檔案分享、即時通訊、視訊會議」等服務。MailCloud 在台灣耕耘 20 多年百大企業與公務機關好評,更多訊息: https://www.mailcloud.com.tw/web/suite.html
Cyber Security
152    0
Smart Manufacturing
Cyber Security
GAIA is the largest Anti-DDoS provider in the Asia Pacific region, with the most experience in network security protection. By providing DDoS protection, WAF, anti-network robot (bot management) and other services to protect corporate information security from leaks.
BAOHWA TRUST AIoT Cyber Physical Security solution
4    0
Smart Security
BAOHWA TRUST AIoT Cyber Physical Security solution
BAOHWA TRUST specializes in providing the most comprehensive Cyber and Physical System(CPS) security solutions for companies, governmental institutions and schools. With BAOHWA TRUST's professionalism, threats in organization's website and server will be detected and eliminated, yet all important devices will be monitored and protected. This allows our clients to operate under AIoT network safely which in turn secure the organization's long-term development.

Exhibitors

HwaCom Systems, Inc.
ECOLUX Technology
CHT Security Co., Ltd.
Trend Micro Incorporated
FiduciaEdge Technologies Co. Ltd.
Southern Taiwan University of Science and Technology
Kingwaytek Technology Co., Ltd.
Onward Security
Openfind Information Technology, Inc.
Changing Information Technology Inc.
ArmorX Global Technology Corporation
WebComm Technology Co., Ltd.
BAOHWA TRUST CO., LTD.
Freedom Systems Inc.
Gaia Information Technology Corp.
TOP