Welcome to COTV International Login Register
2024 China (Shanghai) Network Information Security Technology Exhibition
Industry: Other Industry
Cycle: Once a year
Time: 2024/03/26 - 03/28 (Tues To Thur Total 3 Days)    Error Correction
Address: Shanghai Shanghai Cross border Procurement Exhibition Center ChinaShanghai CityPutuo District 35 Zhongjiang Road, Putuo District, Shanghai
Sponsor:Beijing Mingbo International Exhibition Co., Ltd
Organizer:China Urban Development Alliance New Urbanization Development Center
Closed

INTRODUCTION

2024中国(上海)网络信息安全技术展览会-大号会展 www.dahaoexpo.com

2024中国(上海)网络信息安全技术展览会-大号会展 www.dahaoexpo.com

The Network Information Security Technology Exhibition (AIOTE Smart Expo) has been successfully held for more than ten times since its establishment in 2010. It is a well-known, large-scale, and influential professional exhibition in China, recognized by the international industry as one of the indispensable exhibitions. With the continuous improvement of the international status and influence of AIOTE Smart Expo, it has become an important exhibition for communication and trade in the smart city, Internet of Things, big data, and artificial intelligence industries at home and abroad. It has become a display platform for the latest achievements of modern smart cities, Internet of Things, big data, and artificial intelligence technologies, and is a benchmark for the development of China's science and technology industry. The AIOTE Smart Expo brings together advanced global products such as smart cities, the Internet of Things, big data, artificial intelligence, smart homes, and smart construction sites. For domestic exhibitors, buyers, and users, it is an international inspection that does not go abroad.

Scope

1. Computer Environment Security

Trusted computing office equipment security, email security, host antivirus, computer hardware security, desktop management, host auditing, standalone antivirus, network document encryption and permission control, host, security reinforcement, terminal login, identity authentication, mobile storage media management, patch management, and other security network antivirus products;

2. Communication network security

Internet behavior management, VPN, anti DDoS, domain name security, load balancing, firewalls, routers, VPN gateways, anti spam products, intrusion detection network antivirus, physical isolation, e-government security, network security and management, computer, virus and worm confrontation, authentication and authorization, etc;

3. Cloud security

Cloud Anti DDoS, Cloud WAF, Cloud Access Security, Cloud Host Security, Cloud Application Security, Cloud Network Architecture Security, Cloud Native Security, Cloud Application Protection System, Cloud Identity Management

4. Security development

Dynamic application security testing, static application security testing, interactive application security testing, and security development process control

5. Application protection

Web page tamper prevention, WAF, web application scanning and monitoring RSAP, code security, vulnerability scanning, web application scanning and monitoring, web page tamper prevention, web application firewall

6. Identity recognition and access management

Facial recognition, retinal recognition, iris recognition: facial recognition, voice recognition, fingerprint recognition system, palm print recognition, vein recognition, handwriting recognition, seal recognition technology, etc

7. Boundary Access Control

Fortress machines, network isolation/gateways, firewalls, digital certificate authentication for network access, identity recognition and management, etc;

8. Content security

Malicious content detection, public opinion monitoring, phishing detection, information monitoring and filtering, public opinion monitoring, email security, anti phishing, etc.:

9. Business risk control

Business anti fraud, account security, verification code security, internet business security, industrial control security, video private network, network integration platform, enterprise application and office equipment security, etc

10. Data security

Encryption machine, disaster recovery backup, data security governance, digital desensitization, data leakage prevention, database security, ransomware protection

11.

Threat monitoring and capture

NTA, NDR, advanced threat monitoring, malware monitoring, IDPS, host security, EDR, spoofing, honeypot

12. Security Intelligence

Threat intelligence, cybersecurity asset mapping, vulnerability intelligence

13. Vulnerability monitoring and management

Vulnerability management and monitoring

14. Event management response

SOC, SIEM, SOAR, Risk and Vulnerability Management UEBA, Investigation and Evidence Collection

15. Security Services

Security consulting and service education, penetration testing, attack and defense drills, risk assessment, security crowdsourcing, security shooting range, security evaluation consulting, threat intelligence, advanced threat protection, network traffic analysis, evidence tracing, and user behavior analysis

16. Internet of Things Security

Internet of Vehicles, Video Dedicated, Other IoT

17. Industrial control safety

Industrial firewall, industrial network isolation system/gateway, industrial control security monitoring, and industrial control security management

18. Mobile security

Enterprise mobile management, mobile business management, mobile terminal management, mobile antivirus, mobile app security, mobile terminal security, mobile business security

19. Commercial Passwords

Commercial password applications, database security, file transfer encryption, key management and recovery, computer keys, anti replication floppy disks, encrypted storage devices, encryption of computers and secure communication, and other commercial password products, applications, management, future password research directions, and next-generation password technology applications, such as quantum cryptography brain based passwords, password attack and defense, etc

20. Other and Commercial Passwords

Application experience and cases of information encryption and biometric identification in finance, securities, taxation, national defense, public security, government and other fields

Costs & Precautions

Please contact the exhibition organizer for implementation before participating in the exhibition.

2024中国(上海)网络信息安全技术展览会-大号会展 www.dahaoexpo.com


Contact

  • Company:Beijing Mingbo International Exhibition Co., Ltd
  • Truename:Manager Niu
  • Mobile:16627416391
  • E-mail:382689740@qq.com
  • Address:35 Zhongjiang Road, Putuo District, Shanghai

Disclaimer

The information on this site comes from the network and related members, and the website has done its duty to review it. Due to the uncontrollability of the process of organizing the exhibition, some of the exhibition information in the station may change the subject matter, Extending or cancelling the event, please exhibitors and visitors must check with each other again before exhibiting! All the exhibitions in this site are not hosted/co-organized or organized, if there are any disputes during the exhibition, please hold the main responsibility of the exhibition organization! QQ Email: 523138820@qq.com WeChat: 523138820 Mobile: 15313206870

HOT

Expo News