Products
Network Security Email Security Authentication Credential Management Data Encryption Desktop Management Big Data Wi-Fi Solution Security AudiT Hyperconverge DNS Protection Mobile Apps Security Security Awareness Application Control Device Control SOARContact us at:
Our address:
UDS Data Systems Limited
Room 2101-2102,
Technology Plaza,
651 Kings' Road, Hong Kong
Network Security
Network security is a key to protect company IT infrastructure. It is the fundamental measure to ensure a secure environment for company business operation. We provide cost effective network security solutions to help company to protect their IT asset from malware, virus, and other network attacks and the same time our network security product can also enable company to maximum the performance and investment return on the network resources.
FortinetFortigate UTM appliances, Fortiweb web application firewall |
AllotNetEnforcer bandwidth optimization and management device |
|||
TippingPointHigh performance Network Intrusion Prevention System |
Radware Radware (NASDAQ: RDWR), is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. |
|||
Trend Micro As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security. Trend Micro security fits the needs of our customers and partners. Our solutions protect end users on any device, optimize security for the modern data center, and secure networks against breaches from targeted attacks. We deliver top-ranked client-server, network, and cloud-based protection that stops new threats faster, detects breaches better, and protects data in physical, virtual, and cloud environments. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world. HP ArcSight A comprehensive Security Information & Event Management (SIEM) solution that enables cost-effective compliance and provides advanced security analytics to identify threats and manage risk, so you can protect your business. |
HP
Fortify Comprehensive Application Security More than 80 percent of today's cyber-attacks target applications. An integrated, holistic, approach to application security is crucial for agile development. You need to systematically test and scan all applications, whether they're developed in-house, by a third-party, open source or off-the-shelf. Fortify offers application security solutions on-premise and on-demand to cover all of your software security needs including mobile app security and web security. Secure Code Warrior Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning. Our powerful platform moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific. |
|||
Tufin Tufin tracks all policy and networking changes across all platforms providing an accurate and up-to-date view of security across the network. Tufin also provides policy optimization recommendations and advanced tools for network and security operations teams. |
Kemp Kemp's main product, the LoadMaster, is a load balancer built on its own proprietary software platform, that enables to run on almost any platform like Hyper-V, VMware, on bare metal or in the public cloud. |
Email Security
Email is one the most important business application today. We provide email security solution which can protect the confidentiality of your email communication, prevent virus attack, filter spam mail, as well as help you to comply the related security compliance requirements.
FortinetFortimail Email security appliance |
SophosSophos Email Security System which block spam, malware and prevent data loss |
|||
SecureAge
LotusNotes Confidential email
plugin. |
PGPPGP complete email encryption platform for both desktop and gateway level email encryption and digital signature. |
Authentication
We provide strong multi factor authentication (such as contactless smartcard, contact smartcard, fingerprint, PIN, PKI) solution for remote access (i.e VPN, Outlook Web Access, Citrix, IIS), windows logon and physical door access.
AladdineToken, Smartcard and Token Management solution |
HIDPhysical and Logical authentication solution. Contact and contactless smartcard reader, fingerprint reader. |
|||
SPHINXMulti-factors (contact card, contactless card, fingerprint, PKI) Windows logon solution. |
Credential Management
In computing, identity management
(IdM) describes the management of
individual principals, their
authentication, authorization, and
privileges within or across system and
enterprise boundaries with the goal of
increasing security and productivity
while decreasing cost, downtime and
repetitive tasks.
The terms "Identity Management" and
"Identity and Access Management" are
used interchangeably in the area of
Identity access management, while
identity management itself falls under
the umbrella of IT Security.
SafendData Leakage Prevention solutions for Enterprise Endpoints. |
|
Sophos Next-generation endpoint protection including antivirus, HIPS, web security, malicious traffic detection and more. |
||
Carbon BlackA new era of endpoint
security by enabling
organizations to disrupt
advanced attacks, deploy the
best prevention strategies.
|
ObserveIT ObserveIT Insider Threat Management, detect insider threat and stop data loss. |
Data Encryption
Data contains company's critical business information should be safeguarded from unauthorized access. We provide multiple different encryption solution (such as file encryption, folder encryption, disk encryption, database encryption, transaction encryption) to help you to safeguard such data no matter the data is in rest or exchanged.
SophosSafeGuard production line provides file, folder, disk encryption solution. |
Conpal
|
|||
|
VormetricVormetric provides files, directories, and volumes. Enables encryption of both structured databases and unstructured files. |
Desktop / Endpoint Management
Our enterprise grade desktop management solution provide an easy and efficient way to manage the various desktop issues (such as patch management, software and hardware inventory, desktop security policy, remote access) from a centralize perspective.
LumensionLumension Endpoint Management and Security SuiteLumension Device Control and Application Control |
LANDesk
LANDesk Management Suite |
|||
Big Data
IT data from any application, server or network device that makes up your IT infrastructure. Using a powerful and versatile search and analysis engine that lets you investigate, troubleshoot, monitor, alert, and report on everything that's happening in your entire IT infrastructure from one location in real time.
SplunkSearch, report, monitor and analyze live streaming and historical data across your entire IT infrastructure from one place in real time. |
|
|||
|
|
Wi-Fi Solution
Our Wifi solution helps simplify networking by reducing the cost and complexity of distributed enterprise deployments with cloud-enabled networking solutions. These solutions, based on our unique distributed intelligence architecture, include enterprise-class Wi-Fi access points and revolutionary, easy-to-deploy routers.
AerohiveAccess PointsRouters Network Management Cloud Services Platform Apps |
|
|||
|
|
Security Audit and Assessment
A Security Audit is an extensive and
formal overview of an organization’s
security systems and processes. The
audit is an all-encompassing,
in-depth, review of not only physical
attributes (networks, firewalls,
hardware, etc.) but other areas
including policy and standard
operating procedures.
Security Assessment is generally
referring to a Vulnerability
Assessment which scans an
organization’s infrastructure and
identifies vulnerabilities (faulty
firewall, lack of system updates,
malware, etc.). With the assessment
results, the technician can recommend
steps to remedy the problems within
the system.
Tripwire EnterpriseIs an industry-leading security configuration management solution. It provides end-to-end configuration assessment and file integrity monitoring. |
Rapid 7Penetration testing,
vulnerability management,
compliance, plus other IT
security tools.
|
|||
TenableVulnerability detection
systems |
Fortify |
Hyperconverge
SimpliVity SimpliVity’s hyperconverged infrastructure is the ideal choice for data center consolidation projects. SimpliVity delivers all the functionality of conventional IT infrastructure in one device, with 3x total cost of ownership savings compared to traditional IT environments. SimpliVity simplifies data center consolidation initiatives and reduces the cost and complexity of ongoing data center operations. |
|
|
|
DNS Protection
|
|
|
DNS & IP layer
enforcement
|
Mobile Apps Security
SECIRON Mobile application security hardening solution prevents unwanted activities and tampering's such as decompiling, code stealing, dynamic debugging, virus Trojan embedding, malicious advertisement embedding and more. |
|
Bangcle Mobile application security is not just about performing scans and finding vulnerabilities, it’s about the prevention, protection and real fixes during the entire mobile application life cycle. |
|
MobSPA -
Mobile Application Security
Performance Assurance MobSPA simulates a real attack on the application and the testing process to cover a wide range of application vulnerabilities, potential exploitation damage or leakage, and severity as defined by OWSAP and SANS. The detailed report will include clear recommendations that will guide you to the highest level of security to protect your companies’ assets and integrity based on harmful vulnerabilities in your applications. AppShield - Android Mobile Apps Encryption AppShield for Android features automated, comprehensive and customizable protection for mobile applications. AppShield encrypts the application code to protect any mobile application from reverse engineering, repackaging attacks and adds security functions directly to applications for the active prevention and detection of an application-level intrusion. Penetration Test - Mobile Apps Penetration Test Mobile app penetration test is conducted by the world’s most experienced penetration testing team on mobile platforms. The team combines exceptional experience, quality of works, and creativity to be able to detect almost any vulnerabilities on a mobile system. This is inclusive of mobile applications, TLS, data storage, authentication and authorization, as well as penetration of business logic. WhiteCrypto - White-box Cryptography Key Protector WhiteCrypto uses white-box cryptography technology to ensure sensitive encryption keys, used for such proposes as content protection encryption or user authentication, are kept out of reach of cyber-criminals. AppSCO - Mobile Apps Source Code Obfuscator AppSCO transform the code into a form that is functionally identical to the original code but is much more difficult to understand and reverse engineer using tools. AppSCO support the application source code developed using Android JNI, iOS Xcode and C/C++ /Object C language. SystemOTA for IoT - Internet-of-Things security SystemOTA provide a manageable upgrade strategy, controllable process, secure and highly efficient upgrades in regards to the OTA function (or performance), and gain technological advantage in the differential algorithm and comprehensive security protection of the OTA firmware upgrade for smart devices where inclusive of smart car. Everisk - Mobile App Threat Detection Everisk developed to collect relevant threat information & statistic for user to analyze their mobile application or threat data, and precisely identified sources of threat events. |
Security Awareness
PhishMe PhishMe concept based on dozens of years of experience in penetration testing, social engineering, abuse management, incident response and forensics. As our founding team looked at the results of the annual assessment model we implemented for clients, we realized that to effectively combat phishing attacks, our customers needed to combine compelling exercises with dynamic, immersive training. |
|
PhishMe Simulator
was designed to change risky
behavior and enable employees to
recognize and report malicious
phishing emails.The PhishMe
methodology entails periodically
immersing employees in simulated
real-life phishing scenarios
that deliver hands-on experience
with safe examples and
on-the-spot education
opportunities. The PhishMe
research teams use real phishing
emails to create timely examples
and content focused on today's
greatest threats such as
Business Email Compromise (BEC)
and ransomware. |
|
Security
Awareness Training |
One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives that include, but are not limited to classroom style training sessions, security awareness website(s), helpful hints via e-mail, or even posters. These methods can help ensure employees have a solid understanding of company security policy, procedure and best practices. |
Application Control
- Software access under control effective protection against RansomwareIn a very frightening manner, threats such as Meltdown or Spectre have shown that legacy security measures such as sophisticated authorisation assignments, antivirus software and firewalls alone are no longer a sufficient protection. Protection against zero-day-exploits is a critical requirement.
DriveLock With DriveLock Smart AppGuard you decide, which applications are allowed. Smart AppGuard protects your systems and data against known and unknown threats in a future-proof manner. There is no impact on the performance of the system: even during full Whitelist-mode, the effort of implementation is far less than with comparable solutions. |
Device Control
USB sticks continue to be a popular medium to exchange data - despite various cloud sharing services. Employees also use corporate USB ports to charge mobile phones or other devices. This makes it possible for Ransomware to infiltrate a device, machine or network.
DriveLock DriveLock Smart DeviceGuard controls all removable media and devices. A customised policy can be created based on machine, user, device or company-wide policy. Ensuring compliance through direct policy deployment or deep AD/GPO integration. |
Security Orchestration, Automation and Response
SOAR (Security Orchestration, Automation and Response) is a solution stack of compatible software programs that allow an organization to collect data about security threats from multiple sources and respond to low-level security events without human assistance.
Cortex XSOAR Cortex™ XSOAR is a single platform that orchestrates actions across your entire security product stack for faster and more scalable incident response. |