1. DXC.Technology

      DXC Technology helps clients harness the power of innovation to thrive on change. For more than 60 years, we have successfully guided the world’s largest enterprises and government agencies through successful change cycles.We take pride in our technology independence and our role as a trusted advisor. Our deep experience gives us a clear and confident vision to help clients navigate the future.

      As the world’s leading independent, end-to- end IT services company, we are uniquely positioned to lead digital transformations — creating greater value for clients, partners and shareholders, and presenting growth opportunities for our people. We are among the world’s best corporate citizens.We have 170,000 employees in more than 70 countries, serving some 6,000 clients. We tap into global talent, powerful next-generation IT solutions and extensive partner relationships to help clients transform digitally and seize opportunities.Our extensive partner network helps us drive collaboration and leverage technology independence. We have established more than 250 industry-leading global Partner Network relationships, including 15 strategic partners: Amazon Web Services, AT&T, Dell EMC, HCL, Hitachi, HPE, HP, IBM, Lenovo, Micro Focus, Microsoft, Oracle, PwC, SAP and ServiceNow.

    DXC Service

    • Security Advisory Services , Use our cpnsultancy-led services to assess risks and define and implement business-aligned strategies to optimize readiness.
    • Intelligent Security Operations , Get tailored solutions to support security operations across the digital enterprise, while monitoring and responding to the evolving threat landscape.
    • Identity and Access Management , Deploy a variety of identity solutions, from provisioning and access gevernance to strong authentication and public key infrastructure.



  2. IBM Security

      IBM Security solutions are built on a framework that spans hardware, software and services. These capabilities comprise a robust set of tools and best practices designed to help address:

    • Intelligence:Through a common and intuitive view that combines deep analytics with security intelligence.
    • Integration:Through unifying existing tools and infrastructures with new forms of defense in order to reduce complexity and lower the cost of maintaining a strong security posture.
    • Expertise:Through a more proactive and trusted source of truth in order to stay ahead of emerging threats and risks.

    Futured Security Solution

      IBM Security solutions help you establish a holistic and mature security posture that can help reduce costs, improve service, manage risk and enable innovation.

    • Security intelligence Analytics , Apply analytics and automation to data and incidents to detect threats, perform forensic analysis and automate compliance.
    • Advaced Fraud Protection , Detect and prevent attack vectors responsible for the majority of online, mobile and cross-channel fraud.
    • Identifity and access management , Govern and enforce access across multiple channels, including mobile, social and cloud.
    • Data Security and Privacy, Prevent data loss and enable data access to support business operations, growth and innovation.
    • Application Security , Test and verify applications before deployment to reduce risks and costs.
    • Infrastructure Protection , Achieve in-depth security across your networks, servers, virtual servers, mainframes and endpoints.            



  3. Cisco

      Cisco Security Manager helps to enable consistent policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment. Using its centralized interface, organizations can scale efficiently and manage a wide range of Cisco security devices with improved visibility. Features and Capabilities Cisco Security Manager provides a comprehensive management solution for:

    • Cisco ASA 5500 Series Adaptive Security Appliances
    • Cisco intrusion prevention systems 4200 and 4500 Series Sensors
    • Cisco AnyConnect Secure Mobility Client


    Cisco Service

    • Advisory, Cisco Advisory Services identify how technology can help you meet your business objectives. Our dedicated advisors work with you to address risks and compliance, improve agility, and unlock the desired outcomes.
    • Implementation , Lower total cost of ownership to stay focused on your core business. Our Implementation Services help by providing expert assistance to develop implementation plans and to validate, migrate, and integrate new technologies in your network.
    • Training , Develop talent truly capable of transforming businesses in the digital age.
    • Optimization, Improve efficiency, performance, and productivity to boost the value of your resources.
    • Managed , Manage and optimize your IT and network assets in the cloud and on-prmises.
    • Technical, Keep IT working consistently, efficiently, and securely.


  4. Nexusguard

      As a longtime leader in DDoS defense, Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations. Continually evolving to face new threats as they emerge, we have the tools, insight, and know-how to protect our clients’ vital business systems no matter what comes their way.“Enabling the Internet the way it is meant to be.”Our overriding objective is to prevent attacks that disrupt online businesses and enable the use of the Internet as intended. We protect companies of all sizes with premium Internet security solutions, empowering them to focus on their business — and not on how to maintain business uptime. Our dedicated account managers work relentlessly to ensure all customer needs are met. And every day, our experienced security experts and researchers fortify Nexusguard’s repository of attack signatures — a critical resource for quickly formulating on-target mitigation strategies and better security solutions.Nexusguard is wholly owned by Legend Ventures Holding (LVH), with a vision of establishing a multi-discipline empire. The corporation has a specific focus in engaging in real estate developments and investments in Asia undertaking strategic partnerships in financial markets, most recently investing in promising growing technology startups.

    Nexusguard Service

    • Nexusguard’s Global DDoS Mitigation Network , Nexusguard’s Service Provider Enablement (SPE) program is a global cybersecurity strategic network created to deliver mutual benefits to service providers and customers. Partnering with service providers worldwide, we pool resources and bandwidth capacity to create a Nexusgaurd’s Global DDoS Mitigation Network. Every service provider partner contributes to and benefits from shared mitigation capacity on a fair and transparent basis in this network.
    • Hybrid Model , The Nexusguard Service Provider Enablement (SPE) Hybrid Model combines on-premise and cloud mitigation capacities and functionalities. The solution is ideally suited for environments that demand extremely low latency and multi-layered protection.
    • Pure-Cloud Solution, The Nexusguard Service Provider Enablement (SPE) Cloud Model enables you to quickly expand existing DDoS protection services and even launch new ones without any additional capital expenditures for infrastructure or manpower.


  5. Trend Micro

      As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security.Trend Micro security fits the needs of our customers and partners. Our solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. We deliver top-ranked client-server, network, and cloud-based protection that stops new threats faster, detects breaches better, and protects data in physical, virtual, and cloud environments.Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world.

    Trend Micro Service

    • Cloud Service Provider Solutions , Lower the barriers to widespread adoption of your cloud service by offering your customers a safe and officient path to public cloud adoption.
    • ISP/Telco Solution , Adding security to your service portfolio will help your customers protect their families online privacy, data ,and devices.
    • Managed Service Provider Solutions, We automate security management and offer pay-as-you-go billing, so you can focus on key priorities like increasing value to you customers and growing your business.


  6. HanSight 

      Next generation big data analytics platform to enable organizations to detect, trace and respond to threats such as cyber breaches, financial fraud and targeted Advanced Persistent Threats (APT)

    • Distributed architecture for collecting, processing and analyzing unlimited logs, flows and traffic from applications, networks, endpoints and cloud.
    • Patented analytics algorithms help to detect threats, breaches or fraud from terabyte raw log with great accuracy in seconds.
    • Real-time retrieval and traceability providing similar Internet search engine based on any keyword positioning to all relevant information capabilities.
    • Original record evidence: the use of distributed file system to achieve a large amount of security-based information in long-term, flexible to be adjusted at any time.


    HanSight Service

    • Patented Algorithms , Using machine learning, HanSight detect anomaly user behavior, cyber attacks and fraud, reduces false-alarms, by collecting and analyzing a variety of historical and contextual data.
    • Unified Platform , HanSight is built from the ground up to address future security needs in a world of big data, 10x faster than legacy SIEM products, and unifies Log Management, Assets Discovery, SIEM, UEBA and Network Analytics.
    • Threat Intelligence , HanSight harvests real-time threat intelligence from tremendous sources, including entire web, existing victims and IoT world. Seamless integrated with HanSight platform.
    • Meet the Expert, People is key to a successful modern SOC. With experienced consultants and analysts, HanSight helps you to design and land a business-oriented, scenario-driven next generation SOC, and leads to a positive ROI


  7. SEWORKS

      As five-time DEFCON finalists, SEWORKS ensures that mobile apps are safe from dangerous hacking threats that destroy intellectual property, and put sensitive user information at risk.Security solutions that only protect devices or data leave apps exposed. Often the first step in compromising an app is through a breach in the architecture of the app itself. Neither developer nor users are safe when apps aren’t safe. SEWORKS believes security must exist on all levels of the application.SEWORKS provides multiple layers of app security, including threat detection. Our binary-level source code obfuscation prevents unauthorized duplication or modification of mobile apps by third parties. By anticipating and neutralizing hacker’s first line of attack, we provide developers with the world’s most robust anti-hacking solution.At SEWORKS we know the best way to stop a hacker is to think like one. SEWORKS was founded in 2013 by a group of world class security experts and white hat hackers to provide world-class protection for mobile applications. We are dedicated to constantly advancing the state of the art of mobile app security for developers on iOS and Android platforms.

    Seworks Service

    • Open Malware Cloud Detection , The interfaces of malware cloud detection system are completely open. Our engine users can make fine-grained customization on cloud detection method and depth with aims at their products’ requirements, enjoying the conveniences brought by the cloud detection.
    • VirusView : Malware Knowladge Encyclopedia , VirusView contains a full range of analysis reports of more than 1 million kinds of malware and the multi-engine detection results of more than 10 million kinds of malware. It has on-line version and off-line version, opening several query interfaces. The engine users can gain more detail and comprehensive information about the specific malware.
    • Backend Automatic Malware Analysis System , The system can carry out automatic static analysis, dynamic analysis and risk determination on Android applications with user-friendly interface and management functionality. It can be integrated profoundly to your solutions of BYOD and MDM/MAM to make deep analysis on Android malware, adware, spyware and common applications
    • On-Demand Manual Analysis and Responese, According to users’ needs, it can execute in-depth manual analysis and long-term tracks on critical malware and the relevant security threats, providing detail analysis reports and delivering comprehensive solutions and options.


  8. Antiy Labs

      Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware. Founded at 2000, Antiy Labs has always been focusing on antivirus field in the past twelve years, dedicating on providing the best-in-breed antivirus products and solutions for our partners. We has had a profound understanding of user needs and accumulated abundant experience and technologies. Antiy Labs has also made efficient emergency response to significant security threats and actively participated in academic and industrial activities.The main product of Antiy Labs is an antivirus engine middleware that named AVL SDK. It can be used to detect malware, adware and spyware of both PC and mobile platforms. Users can easily integrate it to their network devices, software and mobile applications to gain the top-level antivirus capability. AVL SDK can be transplanted to various hardware platforms and can adapt to different network environments and computing capabilities. Its detection capability of malware has been verified by authoritative tests and academic researches. Presently, AVL SDK has been used by several enterprises in US, Japan and China, and running in tens of thousands of network devices and nearly ten millions mobile devices.Antiy Labs also provides next generation antivirus services, including open cloud detection of malware, malware knowledge encyclopedia, backend automatic analysis system, on-demand manually analysis and response and so on, to assist our engine users in improving comprehensive ability against malware-related threats.Antiy Labs persists in exploring and researching in both antivirus and information security fields.

      In the past ten years, Antiy Labs has published large amounts of technical articles in directions like malware detection and participated in several information-security-related open projects, as well as making technical reports in academic and industrial conferences. Antiy Labs has joined organizations like AVAR and MUTE, projects like MAPP, and established cooperation relationships with universities and research institutions around the world.

      The CERT team of Antiy Labs own takes responsibility in emergency response of critical security events and significant malware for the public. Antiy Labs was the first finder of famous malware like CodeRed II and Dvldr in the past. We also published insightful analysis report and efficient response program of malware and PUA, including Blaster, Mytob, Sasser, Stuxnet, Flame, Adrd and CarrierIQ.

    Antiy Labs Service

    • Open Malware Cloud Detection , The interfaces of malware cloud detection system are completely open. Our engine users can make fine-grained customization on cloud detection method and depth with aims at their products’ requirements, enjoying the conveniences brought by the cloud detection.
    • VirusView : Malware Knowladge Encyclopedia , VirusView contains a full range of analysis reports of more than 1 million kinds of malware and the multi-engine detection results of more than 10 million kinds of malware. It has on-line version and off-line version, opening several query interfaces. The engine users can gain more detail and comprehensive information about the specific malware.
    • Backend Automatic Malware Analysis System , The system can carry out automatic static analysis, dynamic analysis and risk determination on Android applications with user-friendly interface and management functionality. It can be integrated profoundly to your solutions of BYOD and MDM/MAM to make deep analysis on Android malware, adware, spyware and common applications
    • On-Demand Manual Analysis and Responese, According to users’ needs, it can execute in-depth manual analysis and long-term tracks on critical malware and the relevant security threats, providing detail analysis reports and delivering comprehensive solutions and options.


  9. NSFOCUS

      NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider, with a proven track record of protecting some of the largest Fortune 500 companies, including the world’s largest mobile provider, and four of the five largest global financial institutions.NSFOCUS provides a Complete Service Provider DDoS Mitigation Solution that protects both customers and infrastructure; while enabling providers to deliver Managed DDoS Services with a multi-tenant Platform that produces the lowest operating costs in the industry.The solution combines cloud and on-premises DDoS defenses with world-class global threat intelligence, working in unison to automatically defeat every size, duration, and frequency of DDoS attacks. The solution enables service providers to deliver new revenue-generating services and offset the cost of DDoS mitigation.

      NSFOCUS Security Labs is a renowned threat research organization that tracks and analyzes global threat intelligence; while identifying network and application threats, campaigns, vulnerabilities, exploits, and security trends. NSFOCUS solutions consume this threat intelligence – putting intel into action.

      NSFOCUS International Business Division (IBD) brings advanced DDoS Defenses to the Americas, Europe, the Middle East, and Asia Pacific.

    NSFOCUS Service

    • DDoS Mitigation Solution, NSFOCUS provides a Complete Service Provider DDoS Mitigation Solution that protects both customers and infrastructure; while enabling providers to deliver Managed DDoS Services with a multi-tenant Platform that produces the lowest operating costs in the industry


  10. Symantec

      Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. Enterprises across the world rely on Symantec for integrated cyber defense against sophisticated attacks across endpoints, infrastructure, and cloud.More than 50 million people and families rely on Symantec’s Norton and LifeLock Digital Safety Platform to help protect their personal information, devices, home networks, and identities at home and across their devices.

    Enterprise Security

      Symantec protects the Cloud Generation through our Integrated Cyber Defense Platform, the industry’s most complete portfolio for securing cloud and on-premises environments. We support 15,000 enterprises in taking full advantage of cloud computing without compromising the security of the people, data, applications, and infrastructure that drive their business. Our advanced technology portfolio is powered by the world’s largest civilian threat intelligence network, enabling us to see and protect against the most advanced threats.

    Symantec Service

    • Premium Suport , Equip your enterprise with a single point of accountability and security expertise when and where you need it.
    • Consulting Services , Symantec Consulting Services provide the experience, expertise and industry intelligence to help you better architect, design, implement and optimize your security software, people and processes.
    • Education Services , A broad range of training solutions to help customers get the most out of Symantec products, maximize IT efficiency, and enable IT best practices.
    • CyberSecurity Services , Extend your team with Symantec to minimize detection and response times, reduce costs, and proactively address known and emerging threats.


  11. Qihoo 360

      Qihoo 360 Technology Co. Ltd. (Qihoo 360) is a leading Internet platform company in China as measured by active user base. At the end of June 2014, we had about 496 million monthly active Internet users, according to iResearch.

      Recognizing security as a fundamental need of all Internet and mobile users, Qihoo 360 built a large user base by offering comprehensive, effective and user-friendly Internet and mobile security products. Qihoo 360 strives to provide services that protect users’ computers and mobile devices against malware and malicious websites.

      Our products and services are supported by our cloud-based security technology, which we believe is one of the most advanced and robust technologies in the Internet security industry.
    On the PC platform, Qihoo 360 offers 3 important products for users to safely access Internet – web browser, app store and search engine. Qihoo 360 also provides two important Internet access point on the mobile platform – mobile web browser and app store.

      Qihoo 360, with its large customer base, derives its income from advertisements and other value added services.

    Qihoo 360 is one of top three Internet companies measured by user base.

    • No.1 – PC and Mobile Internet security provider in China measured by user base
    • No.1 – Web browser provider in China
    • No.1 – Mobile app store in China


    Qihoo Service

    • Realtime Detection , Cloud technology detects lastest Ransomware variants in realtime
    • Intelligent Blocking , Intelligent behavior monitoring to identify any document hijacking
    • Document Protector , Automatically back up your documents before they ara tampered


  12. Digital Arts

      Product & Service , Digital Arts handles product planning, development, sales and support on its own to bring truly “domestic” internet security software and appliance products for companies and individuals. Its product range features i-FILTER (top-share web filtering software for corporations), i-FILTER Browser & Cloud (web security for smart devices), i-FILTER for Consumers (parental control software), D-SPA (proxy appliance product), m-FILTER (email filtering software for corporations), and FinalCode (persistent password-less file security and tracking solution).

      Digital Arts Group started twenty three years ago with a singular vision: for internet convenience, safety and security. Since then, we strived every day to build our team and business by focusing mainly on securing enterprises with data leak protection solutions.

      In the security industry where we engage our primary business, external threats, such as targeted attacks, are becoming more diverse and multi-faceted on a global scale, making it extremely challenging for organizations to ensure data protection using existing security measures. Moreover, the expanding use of IT, notably with cloud computing, IoT and AI, calls for additional security measures and products to combat new types of threats.

      As an internet security provider, it is our mission to begin offering data security solutions to defend organizations from external threats (i.e. targeted attacks) in addition to our current lineup that focuses on enterprise-grade data leak protection.

      Leveraging our domestic/in-house development units to offer effective security solutions for new types of threats, we intend to expand our business to the market of external security, which is said to be over 10 times the market size of that of internal security. In addition, we hope to bring exciting news this year from our overseas endeavors.

    Digital Arts Service

    • Product & Service , Digital Arts handles product planning, development, sales and support on its own to bring truly “domestic” internet security software and appliance products for companies and individuals. Its product range features i-FILTER (top-share web filtering software for corporations), i-FILTER Browser & Cloud (web security for smart devices), i-FILTER for Consumers (parental control software), D-SPA (proxy appliance product), m-FILTER (email filtering software for corporations), and FinalCode (persistent password-less file security and tracking solution).