- Industry: Other Industry
- Cycle: Once a year
- Time: 2024/03/26 - 03/28 (Tues To Thur Total 3 Days) Error Correction
- Address: Shanghai Shanghai Cross border Procurement Exhibition Center ChinaShanghai CityPutuo District 35 Zhongjiang Road, Putuo District, Shanghai
- Sponsor:Beijing Mingbo International Exhibition Co., Ltd
- Organizer:China Urban Development Alliance New Urbanization Development Center
- Company:Beijing Mingbo International Exhibition Co., Ltd
- Contact:Manager Niu
- Mobile:16627416391
- E-mail:382689740@qq.com
- Address:35 Zhongjiang Road, Putuo District, Shanghai
INTRODUCTION
Scope
1. Computer Environment Security
Trusted computing office equipment security, email security, host antivirus, computer hardware security, desktop management, host auditing, standalone antivirus, network document encryption and permission control, host, security reinforcement, terminal login, identity authentication, mobile storage media management, patch management, and other security network antivirus products;
2. Communication network security
Internet behavior management, VPN, anti DDoS, domain name security, load balancing, firewalls, routers, VPN gateways, anti spam products, intrusion detection network antivirus, physical isolation, e-government security, network security and management, computer, virus and worm confrontation, authentication and authorization, etc;
3. Cloud security
Cloud Anti DDoS, Cloud WAF, Cloud Access Security, Cloud Host Security, Cloud Application Security, Cloud Network Architecture Security, Cloud Native Security, Cloud Application Protection System, Cloud Identity Management
4. Security development
Dynamic application security testing, static application security testing, interactive application security testing, and security development process control
5. Application protection
Web page tamper prevention, WAF, web application scanning and monitoring RSAP, code security, vulnerability scanning, web application scanning and monitoring, web page tamper prevention, web application firewall
6. Identity recognition and access management
Facial recognition, retinal recognition, iris recognition: facial recognition, voice recognition, fingerprint recognition system, palm print recognition, vein recognition, handwriting recognition, seal recognition technology, etc
7. Boundary Access Control
Fortress machines, network isolation/gateways, firewalls, digital certificate authentication for network access, identity recognition and management, etc;
8. Content security
Malicious content detection, public opinion monitoring, phishing detection, information monitoring and filtering, public opinion monitoring, email security, anti phishing, etc.:
9. Business risk control
Business anti fraud, account security, verification code security, internet business security, industrial control security, video private network, network integration platform, enterprise application and office equipment security, etc
10. Data security
Encryption machine, disaster recovery backup, data security governance, digital desensitization, data leakage prevention, database security, ransomware protection
11.
Threat monitoring and capture
NTA, NDR, advanced threat monitoring, malware monitoring, IDPS, host security, EDR, spoofing, honeypot
12. Security Intelligence
Threat intelligence, cybersecurity asset mapping, vulnerability intelligence
13. Vulnerability monitoring and management
Vulnerability management and monitoring
14. Event management response
SOC, SIEM, SOAR, Risk and Vulnerability Management UEBA, Investigation and Evidence Collection
15. Security Services
Security consulting and service education, penetration testing, attack and defense drills, risk assessment, security crowdsourcing, security shooting range, security evaluation consulting, threat intelligence, advanced threat protection, network traffic analysis, evidence tracing, and user behavior analysis
16. Internet of Things Security
Internet of Vehicles, Video Dedicated, Other IoT
17. Industrial control safety
Industrial firewall, industrial network isolation system/gateway, industrial control security monitoring, and industrial control security management
18. Mobile security
Enterprise mobile management, mobile business management, mobile terminal management, mobile antivirus, mobile app security, mobile terminal security, mobile business security
19. Commercial Passwords
Commercial password applications, database security, file transfer encryption, key management and recovery, computer keys, anti replication floppy disks, encrypted storage devices, encryption of computers and secure communication, and other commercial password products, applications, management, future password research directions, and next-generation password technology applications, such as quantum cryptography brain based passwords, password attack and defense, etc
20. Other and Commercial Passwords
Application experience and cases of information encryption and biometric identification in finance, securities, taxation, national defense, public security, government and other fields
Costs & Precautions
Contact
- Company:Beijing Mingbo International Exhibition Co., Ltd
- Contact:Manager Niu
- Mobile:16627416391
- E-mail:382689740@qq.com
- Address:35 Zhongjiang Road, Putuo District, Shanghai
Disclaimer
The information on this site comes from the network and related members, and the website has done its duty to review it. Due to the uncontrollability of the process of organizing the exhibition, some of the exhibition information in the station may change the subject matter, Extending or cancelling the event, please exhibitors and visitors must check with each other again before exhibiting! All the exhibitions in this site are not hosted/co-organized or organized, if there are any disputes during the exhibition, please hold the main responsibility of the exhibition organization! QQ Email: 523138820@qq.com WeChat: 523138820 Mobile: 15313206870