Solutions
Security Service Network Security Physical/Logicall Access Data Leakage Prevention RTTP Other solutionsContact us at:
Our address:
UDS Data Systems Limited
Room 2101-2102,
Technology Plaza,
651 Kings' Road, Hong Kong
Security Service
Security Assessment is generally
referring to a Vulnerability Assessment
which scans an organization’s
infrastructure and identifies
vulnerabilities (faulty firewall, lack
of system updates, malware, etc.). With
the assessment results, the technician
can recommend steps to remedy the
problems within the system.A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer's features and data
Vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.
Policies should be reviewed at planned intervals to ensure their continuing suitability, adequacy, and effectiveness.
Source code scanning is to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with such a high degree of confidence that what's found is indeed a flaw.
Security Awareness Training will educate employees about corporate policies and procedures for working with information technology (IT). Employees should receive information about who to contact if they discover a security threat and be taught that data as a valuable corporate asset.
Network Security
To fight against day to day evolving potential threat, we provide multi layer network protection solution to help you to prevent unauthorized access to your corporate network. These solution combine the technologies include firewall, antivirus, instruction prevention system and safeguard your network access gateway.
For authorized remote access, we
provide SSL VPN with two factor
authentication solution. Such solution
enables a secure and ease-to-use
communication channel for your
business partner to connect from
remote network, home or even hotel.
Physical and Logical Access
Physical security restricts access to company premises and logical security protects IT resources. These two areas usually work independently. Now organizations need to mitigate information theft risk and comply with data protection regulations. We provide an integrated approach to combine power of both physical security control and logically security control with one single employee card. Employee with on single card (with contact or contactless technology) can securely identify himself and access authorize physical and logical resources.
Data Leakage Prevention
Data leakage may occur when data
itself is being transferred, processed
or even at rest. The increasing use of
mobile devices and removable media
make the chance of data leak increases
substantially. To cope with the
problem, we provide Data Leakage
Prevention (DLP) solutions which
include encryption, access control,
device control and content filtering
to help you to protect the data at
rest, data in motion and data in
processing.
RTTP
What is RTTP?
Reindustrialisation and
Technology Training Programme
(RTTP) is a funding scheme under
the Innovation and Technology
Fund which subsidises local
companies on a 2:1 matching
basis to train their staff in
advanced technologies,
especially those related to
"Industry 4.0". What is the funding ceiling? Each company is subject to a funding ceiling of HK$500,000 in each financial year at the time of approving the application. |
Companies interested in applying for
training grant for their employee(s)
to attend registered public courses
should apply via the online system (https://rttp.vtc.edu.hk)
at least two weeks before the
commencement of the courses. A list of
registered public courses is available
for reference. For tailor-made
courses, companies should apply for
course approval and training grants in
one go.
RTTP Course
UDS is a qualified course provider under the Reindustrialisation and Technology Training Programme(RTTP). UDS supports RTTP Training Program by launching Security Awareness Training – Anti Phishing Workshop. For more detail of this course, please refer to workshop detail.
The objective of the workshop is to
help candidates understand how
phishing attacks work, the tactics
that cyber criminals employ, how to
spot and avoid a potential attack and
most importantly you’ll be improving
yourself and less vulnerable to
phishing attacks.
UDS also provides other training
related to cyber security in order to
promote and encourage applicants to
adopt lifelong learning in the
manner of advanced technologies,
especially those related to "Industry
4.0".
Other Solutions
The above solutions are only a
shortlist. We understand that your
security requirements could be unique,
and we are committed to design a
solution to fulfill your requirements.