TECHNOLOGIES



You have found 31 search results

The 3i-Filter (L7 DPI Packet Content Filtering System)allows large-scale real-time deep packet inspection and filtering on multiple 10/100Gbps links based on object, REGEX pattern(such as text string, keywords, account, ID, email, usernameetc...) and signature detection. It accesses and delivers traffic from one or more full-duplex networks to multiple network intelligence tools such as Intrusion Detection System (IDS), Intrusion Protection System (IPS), Virus and Malware Analyzer, andData Lost ...

Exhibitor : Expert Team Pte Ltd
Favourite

Commercially available Anti-Drone solutions usually use jammer (jamming the frequencies used by the drones to make the drone crash or go away), net (by another drone or from the ground shooter), and eagle (to catch and stop the drones) and so on. However, our solution is different from these. We design our Anti-Drone solution with the main intention of taking over the control of the drone. Instead of blindly jamming the frequency signal, our system scans (all Wi-Fi 2.4GHz and5.0GHz frequency ban...

Exhibitor : Expert Team Pte Ltd
Favourite

AppSuit protects mobile applications such as Game applications, Finance applications (Mobile banking, Mobile Payment, Mobile Stock Trading, etc.), E-Government applications, O2O applications and IoT applications. Mobile app which is modified by malicious hacker can cause serious security threats. If the app will be strongly protected by these hacking techniques, more than 90 percent of app hacking will be protected. That's why we developed the app security solution 'AppSuit'. We pr...

Exhibitor : National IT Industry Promotion Agency
Favourite

Piql safeguards your irreplaceable information! What the Global Seed Vault is for plants, the Arctic World Archive is for the world’s irreplaceable data; - a secure and safe place where the data will be available when all other systems fail. Piql has developed an ultra-secure data storage and long-term digital preservation solution, the Piql System. Piql has converted a photosensitive film into a self-contained digital preservation medium, the piqlFilm. The piqlFilm is kept in the piqlBo...

Exhibitor : Piql AS
Favourite

In most organizations, the e-mail represents on the one hand one of the most difficult to track attack vectors, and on the other hand both attachments and e-mail headers represent an invaluable source of proprietary information for both the traceability of mails, and company sensitive information in case of attachments. Those e-mails shouldn't get neither lost nor altered in any way. E-mail systems are also being widely used for collection of IoT messages generated by devices, as well as fo...

Exhibitor : Catalonia Trade and Investment
Favourite

Harness the Power of the Cloud to Make Managing Your Network Security Easier than Ever. No more unknown, unmanaged, unsecured devices in your network. Device platform information is a vital element in the world of IoT Without knowing the specific platform information, you can't really protect IT assets. A critical part of IT security is staying on top of operating system updates, security releases, and patches. Smart Visibility See and assess what is connected and connecting Network D...

Exhibitor : National IT Industry Promotion Agency
Favourite

Cyber security threats keep increasing, and the shortage of the workforce is widespread. To respond to changing cyber threats, Industry needs skilled professionals, not just workforce. Surely, finding qualified workforce is more difficult. We commonly think the education will reduce this skills gap. But even if there are hands-on training in the traditional education, it could teach only knowledge and skills. There are limitations to the traditional training since knowing how to apply skills in...

Exhibitor : National IT Industry Promotion Agency
Favourite

The motivation of E-chain development is to allow the end user to have the capability of safe keeping their personal stuff with the aid of technology. The E-chain utilized wireless technologies to scan the personal items are within the user vicinity and it detects the potential probability of theft by alerting the user. The E-chain consists of two modules, the tag and reader devices. The roles of the tag devices are the vicinity security lock, whereas the reader device is to scan and detect the ...

Exhibitor : Ngee Ann Polytechnic
Favourite

This smart card is equipped with a sensor and is used for verifying your identity. With this product, you won’t be worrying about forgetting any passwords. You yourself, more exactly, your fingerprint is the password! Without limitation in time and place, the card scans your fingerprint and helps you get through anywhere identification is required. Once you place your fingertip on the sensing area, the smart cardwillstart cross-checkingthe fingerprintinternally, without the help of any ex...

Exhibitor : National IT Industry Promotion Agency
Favourite

With the rise of new threats to cargo security, it is becoming increasingly important for companies to deploy electronic cargo tracking solution in their logistics operations. This technology is an integrated trip based security portal that combines the use of GPS, satellite, RFID and NB IoT to improve efficiency and security. Users of this solution will be able to track their cargo electronically alongside additional features necessary to their operations, for instance, the tracking of light, t...

Exhibitor : Ascent Solutions Pte Ltd
Favourite

We offer a side-channel-attack-resistance (SCA-resistance) technology to realize hardware secure crypto accelerators, e.g. Advanced Encryption Standard (AES) crypto accelerators. If there is no SCA-resistance techniques embedded in the crypto accelerators, they could be easily side-channel-attacked by simply monitoring their power dissipation/electromagnetic emission profiles, hence the password key of the crypto accelerators could be broken; see Fig. 1 for some examples for SCAs and Fig. 2 for ...

Exhibitor : Nanyang Technological University - NTUitive Pte Ltd
Favourite

The marketplace requires a breakthrough network packet forensics solutions for Internet Monitoring, Cyber Security & Intelligence, Cyber Crime Prevention & Investigation for Enterprises, and Government & Internet Service Provider (ISP) networks. Intelligence Reconstruction Gear OS (IRGO)and Real-Time Packet Reconstruction Technology (RTPR) is our invented operating system and mechanism in decoding and reconstructing the network packets in real-time (or near real-time) for various pur...

Exhibitor : Expert Team Pte Ltd
Favourite

Internet Filtering Service providesfor kids and their parents to protect our kids from harmful contents (sex, gamble, drugs,IS contents, etc) on the internet and mobile apps by over 7 million domestic and international blacklist database. Web Filtering Service The filtering service on the web is directly embedded into the ISP Network. This arrangement disables the user to remove or avoid the blocking system. High filtering rate is maintained by real time database update. Mobile Filtering S...

Exhibitor : National IT Industry Promotion Agency
Favourite

We ware founded in 2015 by highly experienced engineers, dedicated to developing innovative and cost effective recognition devices. We were named one of the K-Global 300 Companies by the Korean Ministry of Science, ICT and Future Planning in 2017. The company’s vision is to apply iris recognition security solution to improve social infrastructure, making the cities safer and smarter. As the first step,we are offering cost-effective, compact, and highly accurate biometric identification mo...

Exhibitor : Gyeonggi Technopark
Favourite

Ahighly reliable storage system achieved by low spatial, computation & bandwidth overhead based on a new method to construct LDPC codes for adding redundancy. It offers several innovations andsignificantadvantages over existing solutions as follow : Increased reliability can be achieved with the same computational complexity and consumption of system resources. This is in comparison with Reed­ Solomon codes where the complexity is increased linearly with the reliability Efficient blo...

Exhibitor : Nanyang Polytechnic
Favourite

The use of biometric data such as fingerprints to unlock mobile devices and verify identity at immigration and customs counters are used around the world. Despite its wide application, one cannot change the scan of their fingerprint. Once the scan is stolen or hacked, the owner cannot change his/her fingerprints and has to look for another identity security system. In view of this, we haveinvented a new technology entitled “lip motion password” (lip password) which utilises a person&...

Exhibitor : Hong Kong Baptist University - Knowledge Transfer Office
Favourite

This long-term didgital preservation technology can safeguard your irreplaceable information. The technology solves the problem of storage medium- and technology-obsolescence, and guarantees that data can be retrieved in the near and distant future. It is migration-free and self-contained. The ultra-secure data storage and long-term digital preservation solution is achieved with the conversion of a photosensitive film into a self-contained digital preservation medium.The film is kept in the un...

Exhibitor : Piql AS
Favourite

Information Dispersal Algorithm (IDA) can be used to secure data stored in the cloud, as an alternative to encryption. By dispersing data into multitudes of slices to be stored in multiple locations, we achieve both secrecy and availability. As a form of threshold cryptography, an attacker need to compromise a threshold number of data slices to be able to reconstruct the original data. However, for certain type of data, which has strong correlation such as voice and image, it is possible to have...

Exhibitor : Nanyang Polytechnic
Favourite

Electronic ethereum address, which is now a very complex number, is difficult to use by ordinary users and is not safe from hacking. Instead of a complex electronic address, we have developed a technology that makes it easy to send money via chat. In addition, we have developed a technology that allows users to safely and conveniently store and remotely send and receive remittances by providing hacking prevention for mobile device, prevention of hacking of private keys, and secure backup functio...

Exhibitor : National IT Industry Promotion Agency
Favourite

Anyone considering IoT and optimisation of resource and asset utilisation, visibility and productivity will know that solutions require broader 'ecosystem' scale reach. We have embraced the need for security, connectivity,accessibility and scalability to deliver a Unified Cloud Ecosystem (UCE) that comprises: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Identity as a Service (IDaaS), and Software as a Service (SaaS). Leveraging the agility and scalability of...

Exhibitor : Department for International Trade (British High Commission)
Favourite

PicoCELA Backhaul Engine (PBE) is an embedded system application that adds a multi-hop communication capability to a wireless platform using its wireless interface. PBE uses innovative proprietary technology to create a MIMOZONE, providing stable, seamless, swift connectivity in a wide range of wireless deployment scenarios.Furthermore, it uses unlicensedradio spectrum avoiding licensing fees.A MIMOZONE is a complete coverage created by aggregating many super small cells into ONE continuous zone...

Exhibitor : IP Bridge, Inc.
Favourite

Our technology is a new two-factor authentication password security solution using the positions of invisible keypad and the randomized keypad. User presses the password positions on the invisible keypad, which is corresponding to the password positions on the visible keypad of the smart phone.Our technology issimilarto OTP as it uses pseudo-randomness or randomness. We are confident that our technology will be the most effective way to greatly enhance ATM security.And especially when using ATM...

Exhibitor : National IT Industry Promotion Agency
Favourite

Permissioned blockchains for Healthcare are an innovative and secure way to dramatically reduce cost and bureaucracy, increase trust, enable Audit Trails and eliminate conflicts. It is based on a distributed shared ledger of recorded transactions between known, identifiable participants and assets. These transactions can never be erased nor changed as the chain of blocks of transactions is protected by cryptographic hashes. Transactions are approved by consensus of a subset of the participants, ...

Exhibitor : Catalonia Trade and Investment
Favourite

This technology extracts information about linked activities from video feeds in near real time without human intervention. The models currently trained using video precognition Artificial Intelligence (AI) technology focused on identifying human-based activity but are equally adept at detecting other sequences of behaviour from sources other than people, simply by retraining the underlying Recurring Neural Networks (Deep Learning). This allows the system to be used for detecting complex behavi...

Exhibitor : Department for International Trade (British High Commission)
Favourite

The access level network security solution prevents network troubles caused by internal threats in advance. This will help IT manager to manage and monitor the whole network devices easily while various types of wired/wireless network devices are connecting to the workplace network.Your network will not be safe anymore due to BYOD(Bring Your Own Device). It will cause the company to be exposed to internal security threats because of unexpected traffic such as DoS(Denial of Service)/DDoS(Distribu...

Exhibitor : National IT Industry Promotion Agency
Favourite

WE MAKE SENSITIVE DATA IRRELEVANT The current paradigm of developing and deploying applications (either in the cloud or on-premise) assumes the existence of a physical / virtual infrastructure that needs to be protected by either adding layers over layers of controls or by adding several monitoring and alerting systems (including the ones based on user's behavior and AI). Even though we think they add their value, we also believe that the main reason they exist is because data hosted in tho...

Exhibitor : Department for International Trade (British High Commission)
Favourite

Anti-counterfeiting technology is an indispensable asset in times of widespread circulation of counterfeit and pirated goods in the global market. It provides companies and consumers with a means of product identification and authentication. The anti-counterfeiting technology offers product authentication via encrypted identification tagging form factors. One of the identification form factors to be showcased will be the NFC (Near-field communication) tag, a consumer-verifiable technology to de...

Exhibitor : i-Sprint Innovations Pte Ltd
Favourite

The company’s aim is to control any device by voice with maximum efficiency to create a more natural human interface. This is part of a broader industry trend evidenced both by existing commercial products such as Amazon’s Echo, Apple’s Siri, Google Now as well as research projects that will lead to future products, such as the company’s LEGO Mindstorms™example from the field of robotics. In a nutshell; Control any device by simple voice commands and in any languag...

Exhibitor : Department for International Trade (British High Commission)
Favourite

The latest cyber threats originate from outside networks and exploit known vulnerabilities. It also has become more difficult to spot malware. AhnLab MDS proactively detects and responds to threats at each stage of the advanced threat lifecycle. AhnLab MDS (Malware Defense System) is a complete APT protection solution that combines on-premise and cloud-based analytics to defeat advanced targeted threats anywhere across the organization. It provides rapid malware recognition and remediation with...

Exhibitor : National IT Industry Promotion Agency
Favourite

During the last two decades we have witnessed immense advancements in our understanding of the underlying biology of disease thanks to the technologies that allowed us unlock the secrets of our genetic code. The taming of our genome sequence has opened the doors to a new paradigm in medicine, more precise and personalized. However, many institutions and professionals lack access to the tools and infrastructure to make the most of this resource, along with privacy concerns due to the sensible nat...

Exhibitor : Catalonia Trade and Investment
Favourite

Services & Digital Economy