TECHNOLOGIES



You have found 31 search results

The 3i-Filter (L7 DPI Packet Content Filtering System) allows large-scale real-time deep packet inspection and filtering on multiple 10/100Gbps links based on object, REGEX pattern (such as text string, keywords, account, ID, email, username etc...) and signature detection. It accesses and delivers traffic from one or more full-duplex networks to multiple network intelligence tools such as Intrusion Detection System (IDS), Intrusion Protection System (IPS), Virus and Malware Analyzer, and Data L...

Booth C05 - Expert Team Pte Ltd

Commercially available Anti-Drone solutions usually use jammer (jamming the frequencies used by the drones to make the drone crash or go away), net (by another drone or from the ground shooter), and eagle (to catch and stop the drones) and so on. However, our solution is different from these. We design our Anti-Drone solution with the main intention of taking over the control of the drone. Instead of blindly jamming the frequency signal, our system scans (all Wi-Fi 2.4GHz and 5.0GHz frequency ba...

Booth C05 - Expert Team Pte Ltd

AppSuit protects mobile applications such as Game applications, Finance applications (Mobile banking, Mobile Payment, Mobile Stock Trading, etc.), E-Government applications, O2O applications and IoT applications. Mobile app which is modified by malicious hacker can cause serious security threats. If the app will be strongly protected by these hacking techniques, more than 90 percent of app hacking will be protected. That's why we developed the app security solution 'AppSuit'. We provide a prof...

Booth F01 - F24 - National IT Industry Promotion Agency

Piql safeguards your irreplaceable information! What the Global Seed Vault is for plants, the Arctic World Archive is for the world’s irreplaceable data; - a secure and safe place where the data will be available when all other systems fail. Piql has developed an ultra-secure data storage and long-term digital preservation solution, the Piql System. Piql has converted a photosensitive film into a self-contained digital preservation medium, the piqlFilm.  The piqlFilm is kept in the piqlBox, an...

Booth E11 - Piql AS

In most organizations, the e-mail represents on the one hand one of the most difficult to track attack vectors, and on the other hand both attachments and e-mail headers represent an invaluable source of proprietary information for both the traceability of mails, and company sensitive information in case of attachments. Those e-mails shouldn't get neither lost nor altered in any way. E-mail systems are also being widely used for collection of IoT messages generated by devices, as well as for tr...

Booth E16 - Catalonia Trade and Investment

Harness the Power of the Cloud to Make Managing Your Network Security Easier than Ever. No more unknown, unmanaged, unsecured devices in your network. Device platform information is a vital element in the world of IoT Without knowing the specific platform information, you can't really protect IT assets. A critical part of IT security is staying on top of operating system updates, security releases, and patches. Smart Visibility See and assess what is connected and connecting Network Disco...

Booth F01 - F24 - National IT Industry Promotion Agency

Cyber security threats keep increasing, and the shortage of the workforce is widespread. To respond to changing cyber threats, Industry needs skilled professionals, not just workforce. Surely, finding qualified workforce is more difficult. We commonly think the education will reduce this skills gap. But even if there are hands-on training in the traditional education, it could teach only knowledge and skills. There are limitations to the traditional training since knowing how to apply skills in...

Booth F01 - F24 - National IT Industry Promotion Agency

The motivation of E-chain development is to allow the end user to have the capability of safe keeping their personal stuff with the aid of technology. The E-chain utilized wireless technologies to scan the personal items are within the user vicinity and it detects the potential probability of theft by alerting the user. The E-chain consists of two modules, the tag and reader devices. The roles of the tag devices are the vicinity security lock, whereas the reader device is to scan and detect the ...

Booth B10 - Ngee Ann Polytechnic

This smart card is equipped with a sensor and is used for verifying your identity. With this product, you won’t be worrying about forgetting any passwords. You yourself, more exactly, your fingerprint is the password! Without limitation in time and place, the card scans your fingerprint and helps you get through anywhere identification is required. Once you place your fingertip on the sensing area, the smart card will start cross-checking the fingerprint internally, without the help of any exte...

Booth F01 - F24 - National IT Industry Promotion Agency

With the rise of new threats to cargo security, it is becoming increasingly important for companies to deploy electronic cargo tracking solution in their logistics operations. This technology is an integrated trip based security portal that combines the use of GPS, satellite, RFID and NB IoT to improve efficiency and security. Users of this solution will be able to track their cargo electronically alongside additional features necessary to their operations, for instance, the tracking of light, t...

Booth F31 - Ascent Solutions Pte Ltd