Speed up to get your ideal solutions
Registration Closed

Welcome to Asia Cyber Channel Summit Virtual

This year’s ACCS Virtual consists of the integration of online multimedia and online business matching activities through the virtual sales expansion platform. There will be more than 30 Taiwanese cyber security providers who will be exhibiting their products and solutions in ACCS Virtual. You are welcomed to take this opportunity to deepen the interactions with Taiwanese providers and strengthen the information security abilities at the same time; and also to create a safer digital world through this win-win business cooperation.


State-of-the-art PAM Product from Taiwan!

ANCHOR has 3 security goals of privileged access management that includes Privileged Access Life-cycle Management, APT Attacks Prevention, and Threat Alert. To cope with the requirements for Work from Home in the period of COVID-19, we also developed an optional module for adopting Endpoint management rapidly. All-in-one, Secure, Convenience, Pro-active and State-of-the-art PAM product is always the motto of ANCHOR product development.

Watch Now

Cybersecurity Compliance Solutions for Connected Devices

As the intrusion methods of connected devices are constantly updated, the difficulty of test technology and labor costs are getting higher and higher. How to conduct a complete internal security test is the focus of global IoT and industrial control equipment manufacturers. To this end, Onward Security has invested in the research and development of security test tools many years ago, hoping to help manufacturers solve product security problems with automated tools. It introduced HERCULES SecFlow and SecDevice, which are automated product security assessment platforms aimed to help firms implement DevSecOps.

Watch Now

Bring Your Own Key

Addressing the cybersecurity problems people may face after digitization. ex., Password-hacked, data flow control, data integrity, and so on. The idea of non-password is of high interest due to more and more password hacked problem. FIDO2 could be a perfect solution for people to access internet applications. Keyxentic provides a new concept that supports FIDO2 but also protecting the Data. Without the right biometric authentication, digital property is safe and non-assessable.

Watch Now

Getting Ready for the Next Cyber Pandemic – Lessons Learned from 300+ Security Incidents.

In the last 5 years, we have handled and analyzed more than 300 security incidents. Organizations fell victim to these cyber-attacks include government, high-tech manufacturing, financial business, general trading companies, telcos, healthcare industry, energy companies and transportation sectors. Equipped with the frontline experience and our unique threat intelligence, TeamT5 becomes the best security solution provider. In this presentation, we are going to share with you how we use our unique intelligence, technology and methodology to save victims from serious cyber-attacks, and how we collaborate with global partners to deliver the solutions.

Watch Now

What the COVID-19 teaches us about cybersecurity – and how to prepare for the inevitable global cyberattack

COVID-19 shows that the world is far more likely to get disturbance by cyberattacks than history shows. And a cyber pandemic is probably as inevitable as a future disease pandemic. The time to start thinking about the response is – as always – yesterday. To start that process, it’s important to examine the lessons of the COVID-19 pandemic -and use them to prepare for a future global cyberattack. The comprehensive preparation for cyber pandemic will enable the world to keep from invasion from hackers, as well as decrease security concerns about working remotely. Then shutdown can hardly happen to organizations.

Watch Now

On-site Digital Forensics solution -SmartPhone Triage

SmartPhone Triage is an intelligent on-site evidence collecting tool. By quickly and automatically collecting digital evidence from target mobile devices, it helps law enforcement officers acquire information needed in the shortest time on the scene. With high OCR accuracy and instant keyword filtering, critical evidence could be found within seconds. Moreover, a standalone, user-friendly interface featuring relationship analysis could be very helpful when it comes to in-depth analysis of the collected cases.

Watch Now

Defend Future With You

Exploring Excellent Cyber Security Vendors from Taiwan,
Your Trustworthy Cyber Security Solution Partners

Endorsed by

Asia Cyber Channel Summit 2019




Will visit again


Appreciate matchmaking