Skip to content
UDSHK
  • About UDS
    • Partners
    • Customers
    • Our Management Team
    • Conduct and Ethic
  • Products
  • Solutions
  • News
  • Training
    • RTTP
    • Ransomeware Training
    • Phishing Training
    • Security Awareness Training
    • CISP
      • CISP 注册信息安全专业人员培训(简体页面)
      • CISP 註冊信息安全專業人員培訓(繁體頁面)
  • Download
    • QAX News
    • CCC
    • OWASP
  • Log In
    • Register
  • 0 items
  • View:
  • 12
  • 24
  • All
  • AliCloudQuick View
    • AliCloudQuick View
    • Cloud, In-store Payment
    • AliCloud

    • Unparalleled Computing Power Alibaba Cloud computing services are based on the 3rd-generation...
  • ArubaQuick View
    • ArubaQuick View
    • In-store Payment, Wi-Fi Solution
    • Aruba

    • High-performance, secure enterprise wireless LAN with support for Wi-Fi 6. Wi-Fi access points and...
  • AWSQuick View
    • AWSQuick View
    • Cloud, In-store Payment
    • AWS

    • Cloud computing with AWS. Amazon Web Services (AWS) is the world’s most comprehensive and...
  • BroadcomQuick View
    • BroadcomQuick View
    • Email Security, In-store Payment
    • Broadcom

    • Send preconfigured auto-generated email messages from your continuous delivery pipeline...
  • BroadcomQuick View
    • BroadcomQuick View
    • Data Encryption, In-store Payment
    • Broadcom

    • Protect data in legacy business processes. Implement PGP-based security. Because traditional file...
  • Check PointQuick View
    • Check PointQuick View
    • In-store Payment, Network Security
    • Check Point

    • Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber...
  • Check PointQuick View
    • Check PointQuick View
    • In-store Payment, Wi-Fi Solution
    • Check Point

    • - Access Points - Routers - Network Management - Cloud Services Platform - Apps
  • Cisco UmbrellaQuick View
    • Cisco UmbrellaQuick View
    • In-store Payment, Network Security
    • Cisco Umbrella

    • Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the...
  • CofenseQuick View
    • CofenseQuick View
    • Email Security, In-store Payment
    • Cofense

    • The Cofense Phishing Detection and Response platform does more than just stop phishing attacks...
  • ConpalQuick View
    • ConpalQuick View
    • Data Encryption, In-store Payment
    • Conpal

    • Encryption, Secure identities, Authentication & Resource Control.
  • Cortex XSOARQuick View
    • Cortex XSOARQuick View
    • In-store Payment, Security Orchestration, Automation and Response
    • Cortex XSOAR

    • Cortex™ XSOAR is a single platform that orchestrates actions across your entire security product stack for...
  • Cortex XSOARQuick View
    • Cortex XSOARQuick View
    • In-store Payment, SOC & Cyberrange
    • Cortex XSOAR

    • Cortex XSOAR is the most comprehensive SOAR platform in the market today, orchestrating...
  • Cyber Security TrainingQuick View
    • Cyber Security TrainingQuick View
    • In-store Payment, Security Awareness
    • Cyber Security Training

    • 1. Security Awareness Training 2. Blue Team Training 3. Red Team Training 4. Professional Training...
  • CyberbitQuick View
    • CyberbitQuick View
    • In-store Payment, SOC & Cyberrange
    • Cyberbit

    • Improve Key SOC Efficiency Metrics. Implementing the right SOAR platform will enable you to...
  • Cyberrange Training CenterQuick View
    • Cyberrange Training CenterQuick View
    • In-store Payment, SOC & Cyberrange
    • Cyberrange Training Center

  • DriveLockQuick View
    • DriveLockQuick View
    • Data Encryption, In-store Payment
    • DriveLock

    • Data Loss Prevention, Disk Protection & File Protection
  • DriveLockQuick View
    • DriveLockQuick View
    • Desktop / Endpoint Management, In-store Payment
    • DriveLock

    • In today's digital environment, the success of your business depends on how reliably you protect...
  • DriveLockQuick View
    • DriveLockQuick View
    • Data Leakage Prevention, In-store Payment
    • DriveLock

    • With DriveLock Smart AppGuard you decide, which applications are allowed. Smart AppGuard...
  • ForcepointQuick View
    • ForcepointQuick View
    • Data Leakage Prevention, In-store Payment
    • Forcepoint

    • Data Loss Prevention - A single policy to protect your data, wherever it is. Discover and control all of...
  • ForescoutQuick View
    • ForescoutQuick View
    • Data Leakage Prevention, In-store Payment
    • Forescout

    • Remediate malicious or high-risk devices. Based on your security and compliance policies, CounterACT...
  • FortinetQuick View
    • FortinetQuick View
    • In-store Payment, Network Security
    • Fortinet

    • Fortigate UTM appliances, Fortiweb web application firewall.
  • FortinetQuick View
    • FortinetQuick View
    • Email Security, In-store Payment
    • Fortinet

    • Fortimail Email security appliance
  • FortinetQuick View
    • FortinetQuick View
    • Authentication, In-store Payment
    • Fortinet

    • FortiAuthenticator includes: - Ability to transparently identify network users and ...
  • FortinetQuick View
    • FortinetQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Fortinet

    • FortiClient Unifies Endpoint Features - FortiClient is a Fabric Agent that that delivers protection...
  • FortinetQuick View
    • FortinetQuick View
    • In-store Payment, Wi-Fi Solution
    • Fortinet

    • The most common form of access at the LAN Edge for users these days is Wi-Fi. Wireless...
  • HIDQuick View
    • HIDQuick View
    • Authentication, In-store Payment
    • HID

    • Physical and Logical authentication solution. Contact and contactless smartcard reader, fingerprint reader.
  • IdentivQuick View
    • IdentivQuick View
    • Authentication, In-store Payment
    • Identiv

    • Identiv is a global leader in seamless authentication and security solutions. We verify frictionless...
  • IntsightsQuick View
    • IntsightsQuick View
    • In-store Payment, Threat Intelligence
    • Intsights

    • The IntSights External Threat Protection (ETP) - Automated Discovery, Analysis, and Remediation...
  • IvantiQuick View
    • IvantiQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Ivanti

    • Security Patching, Windows Patching, Application Control, Device Control and Antivirus...
  • JumioQuick View
    • JumioQuick View
    • In-store Payment, Mobile Apps & Code Protection
    • Jumio

    • Automated Identity Proofing, eKYC and Transaction Monitoring - With identity theft and...
  • KasperskyQuick View
    • KasperskyQuick View
    • Email Security, In-store Payment
    • Kaspersky

    • Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence...
  • KasperskyQuick View
    • KasperskyQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Kaspersky

    • Kaspersky Endpoint Security for Business Core is an on-premise and cloud-based security...
  • KempQuick View
    • KempQuick View
    • In-store Payment, Network Security
    • Kemp

    • Kemp's main product, the LoadMaster, is a load balancer built on its own proprietary software platform, that...
  • KnowBe4Quick View
    • KnowBe4Quick View
    • Email Security, In-store Payment
    • KnowBe4

    • Your email filters have an average 7-10% failure rate, you need a strong human firewall as your...
  • Micro FocusQuick View
    • Micro FocusQuick View
    • In-store Payment, Security Audit and Assessment
    • Micro Focus

    • Automate software security management, tracking, remediation and governance across the entire security...
  • Micro FocusQuick View
    • Micro FocusQuick View
    • In-store Payment, Mobile Apps & Code Protection
    • Micro Focus

    • Comprehensive Application Security. More than 80 percent of today's cyber-attacks target applications...
  • Micro FocusQuick View
    • Micro FocusQuick View
    • In-store Payment, SIEM
    • Micro Focus

  • PaloaltoQuick View
    • PaloaltoQuick View
    • In-store Payment, Network Security
    • Paloalto

    • Palo Alto Networks, the global cybersecurity leader, continually delivers innovation to enable secure...
  • PaloaltoQuick View
    • PaloaltoQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Paloalto

    • Safeguard endpoints with next-gen antivirus. To stay ahead of fast-moving threats, you need...
  • PaloaltoQuick View
    • PaloaltoQuick View
    • In-store Payment, Threat Intelligence
    • Paloalto

    • High-fidelity threat intelligence Get unique visibility into attacks, crowdsourced from...
  • PromonQuick View
    • PromonQuick View
    • In-store Payment, Mobile Apps & Code Protection
    • Promon

    • Comprehensive In-App Protection: - PROTECT, Impede attackers’ attempts to reverse-engineer...
  • ProofpointQuick View
    • ProofpointQuick View
    • Email Security, In-store Payment
    • Proofpoint

    • Email, social media, and mobile devices are the tools of your trade—and for cyber criminals, the...
  • Qi An XinQuick View
    • Qi An XinQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Qi An Xin

    • New Generation Endpoint Security Management System (QI-ANXIN Tianqing), a comprehensive solution...
  • Qi An XinQuick View
    • Qi An XinQuick View
    • In-store Payment, Security Audit and Assessment
    • Qi An Xin

    • O&M Security Management and Control System. Adopting New Generation Intelligent O&M...
  • Qi An XinQuick View
    • Qi An XinQuick View
    • In-store Payment, SOC & Cyberrange
    • Qi An Xin

    • QI-ANXIN’s NGSOC is a cyber-situational awareness and security operation platform based on...
  • Qi An XinQuick View
    • Qi An XinQuick View
    • In-store Payment, Threat Intelligence
    • Qi An Xin

    • SkyEye: New Generation Threat Perception System Through attack and defense penetration...
  • QiAnXinQuick View
    • QiAnXinQuick View
    • In-store Payment, Security Orchestration, Automation and Response
    • QiAnXin

  • RadwareQuick View
    • RadwareQuick View
    • In-store Payment, Network Security
    • Radware

    • Radware (NASDAQ: RDWR), is a global leader of application delivery and cyber security solutions for...
  • Rapid7Quick View
    • Rapid7Quick View
    • In-store Payment, Security Audit and Assessment
    • Rapid7

    • Penetration testing, vulnerability management, compliance, plus other IT security tools.
  • RSA NetwitnessQuick View
    • RSA NetwitnessQuick View
    • In-store Payment, Security Audit and Assessment
    • RSA Netwitness

    • NetWitness Detect AI is a cloud-native SaaS offering that uses advanced behavior analytics and machine...
  • SafendQuick View
    • SafendQuick View
    • Data Encryption, In-store Payment
    • Safend

  • SafendQuick View
    • SafendQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Safend

  • Samsung KNOXQuick View
    • Samsung KNOXQuick View
    • In-store Payment, Mobile Device Management
    • Samsung KNOX

    • Knox Manage - Powerful, yet flexible cross-platform Enterprise Mobile Management (EMM)...
  • SecIronQuick View
    • SecIronQuick View
    • In-store Payment, Mobile Apps & Code Protection
    • SecIron

    • Mobile application security is not just about performing scans and finding vulnerabilities, it’s about...
  • Secure Code WarriorQuick View
    • Secure Code WarriorQuick View
    • In-store Payment, Threat Intelligence
    • Secure Code Warrior

  • SecureAgeQuick View
    • SecureAgeQuick View
    • Email Security, In-store Payment
    • SecureAge

    • LotusNotes Confidential email plugin.
  • SophosQuick View
    • SophosQuick View
    • Email Security, In-store Payment
    • Sophos

    • Sophos Email Security System which block spam, malware and prevent data loss.
  • SophosQuick View
    • SophosQuick View
    • Data Encryption, In-store Payment
    • Sophos

    • SafeGuard production line provides file, folder, disk encryption solution.
  • SophosQuick View
    • SophosQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Sophos

    • Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Anti-Ransomware...
  • SophosQuick View
    • SophosQuick View
    • In-store Payment, Wi-Fi Solution
    • Sophos

    • Our cloud-managed Wi-Fi provides the best AP support, scalability and a single pane of glass via Sophos...
  • SOTIQuick View
    • SOTIQuick View
    • In-store Payment, Mobile Device Management
    • SOTI

    • SOTI MobiControl can deploy devices quickly and easily, securely manage apps and content, eliminate...
  • SPHINXQuick View
    • SPHINXQuick View
    • Authentication, In-store Payment
    • SPHINX

    • Multi-factors (contact card, contactless card, fingerprint, PKI) Windows logon solution.
  • SplunkQuick View
    • SplunkQuick View
    • In-store Payment, SIEM
    • Splunk

    • Search, report, monitor and analyze live streaming and historical data across your entire IT infrastructure from one place in real time.
  • SplunkQuick View
    • SplunkQuick View
    • In-store Payment, Security Audit and Assessment
    • Splunk

    • Advanced security analytics at scale - Monitor, detect, investigate and respond to threats with streaming...
  • SplunkQuick View
    • SplunkQuick View
    • In-store Payment, Threat Intelligence
    • Splunk

    • You can correlate indicators of suspicious activity, known threats, or potential threats with your events...
  • TenableQuick View
    • TenableQuick View
    • In-store Payment, Security Audit and Assessment
    • Tenable

    • Vulnerability detection systems.
  • Tencent CloudQuick View
    • Tencent CloudQuick View
    • Cloud, In-store Payment
    • Tencent Cloud

    • High-performance, Secure and Stable Cloud Products and Service. Features included: - Cloud Virtual...
  • TeramindQuick View
    • TeramindQuick View
    • Desktop / Endpoint Management, In-store Payment
    • Teramind

  • ThalesQuick View
    • ThalesQuick View
    • Authentication, In-store Payment
    • Thales

    • Multi-factor authentication serves a vital function within any organization -securing access to...
  • ThalesQuick View
    • ThalesQuick View
    • Data Encryption, In-store Payment
    • Thales

    • Encrypt everything with centralized control. Whether storing data in a physical data center...
  • ThalesQuick View
    • ThalesQuick View
    • HSM & KMS, In-store Payment
    • Thales

    • With Thales Hardware Security Modules, You Can: Address compliance requirements with solutions for...
  • Trend MicroQuick View
    • Trend MicroQuick View
    • In-store Payment, Network Security
    • Trend Micro

    • As a global leader in IT security, Trend Micro develops innovative security solutions that make the...
  • TripwireQuick View
    • TripwireQuick View
    • In-store Payment, Security Audit and Assessment
    • Tripwire

    • Is an industry-leading security configuration management solution. It provides end-to-end configuration...
  • TufinQuick View
    • TufinQuick View
    • In-store Payment, Network Security
    • Tufin

    • Tufin tracks all policy and networking changes across all platforms providing an accurate and up-to-date view...
  • UDS SG Protected DiskQuick View
    • UDS SG Protected DiskQuick View
    • Data Encryption, In-store Payment
    • UDS SG Protected Disk

  • VeracodeQuick View
    • VeracodeQuick View
    • In-store Payment, Mobile Apps & Code Protection
    • Veracode

    • Improve application security testing with Veracode. Veracode provides application security testing...
  • VMwareQuick View
    • VMwareQuick View
    • In-store Payment, Mobile Device Management
    • VMware

    • VMware Mobile Device Management Tools - VMware Workspace ONE UEM - Ensures all devices—office, remote...
  • XSecuritasQuick View
    • XSecuritasQuick View
    • Desktop / Endpoint Management, In-store Payment
    • XSecuritas

  • ZelloQuick View
    • ZelloQuick View
    • In-store Payment, Mobile Device Management
    • Zello

    • Zello is the highest rated push-to-talk app, connecting 150 Million users globally, empowering frontline...
Facebook Whatsapp Weixin

Company

Why UDS?
Our Solutions

Contact

Phone : +852 28510271
Fax.      : +852 28510155
Email   : [email protected]

Copyright © 2010 UDS Data Systems Ltd
Security Service

Security Assessment is generally referring to a Vulnerability Assessment which scans an organization’s infrastructure and identifies vulnerabilities (faulty firewall, lack of system updates, malware, etc.). With the assessment results, the technician can recommend steps to remedy the problems within the system.

A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data.

Vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.

Policies should be reviewed at planned intervals to ensure their continuing suitability, adequacy, and effectiveness.

Source code scanning is to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with such a high degree of confidence that what’s found is indeed a flaw.

Security Awareness Training will educate employees about corporate policies and procedures for working with information technology (IT).  Employees should receive information about who to contact if they discover a security threat and be taught that data as a valuable corporate asset.

Network Security

To fight against day to day evolving potential threat, we provide multi layer network protection solution to help you to prevent unauthorized access to your corporate network. These solution combine the technologies include firewall, antivirus, instruction prevention system and safeguard your network access gateway.

For authorized remote access, we provide SSL VPN with two factor authentication solution. Such solution enables a secure and ease-to-use communication channel for your business partner to connect from remote network, home or even hotel.

Physical and Logical Access

Physical security restricts access to company premises and logical security protects IT resources. These two areas usually work independently. Now organizations need to mitigate information theft risk and comply with data protection regulations. We provide an integrated approach to combine power of both physical security control and logically security control with one single employee card. Employee with on single card (with contact or contactless technology) can securely identify himself and access authorize physical and logical resources.

Data Leakage Prevention

Data leakage may occur when data itself is being transferred, processed or even at rest. The increasing use of mobile devices and removable media make the chance of data leak increases substantially. To cope with the problem, we provide Data Leakage Prevention (DLP) solutions which include encryption, access control, device control and content filtering to help you to protect the data at rest, data in motion and data in processing.

RTTP

What is RTTP?

Reindustrialisation and Technology Training Programme (RTTP) is a funding scheme under the Innovation and Technology Fund which subsidises local companies on a 2:1 matching basis to train their staff in advanced technologies, especially those related to “Industry 4.0”.

What is the funding ceiling?
Each company is subject to a funding ceiling of HK$500,000 in each financial year at the time of approving the application.

How to apply for a training grant?
Companies interested in applying for training grant for their employee(s) to attend registered public courses should apply via the online system (https://rttp.vtc.edu.hk) at least two weeks before the commencement of the courses. A list of registered public courses is available for reference. For tailor-made courses, companies should apply for course approval and training grants in one go.

RTTP Course
UDS is a qualified course provider under the Reindustrialisation and Technology Training Programme(RTTP). UDS supports RTTP Training Program by launching Security Awareness Training – Anti Phishing Workshop. For more detail of this course, please refer to workshop detail.

The objective of the workshop is to help candidates understand how phishing attacks work, the tactics that cyber criminals employ, how to spot and avoid a potential attack and most importantly you’ll be improving yourself and less vulnerable to phishing attacks.

UDS also provides other training related to cyber security in order to promote and encourage applicants to adopt lifelong learning in the manner of advanced technologies, especially those related to “Industry 4.0”.

UDS is found by a group of IT expertise. Our mission is to be a leading information security solutions provider with a high level of service commitment in the region.

UDS specializes in various IT Security Technologies, UTM Solutions, Network/Application Performance Monitoring Solutions, SOAR Architect and Implementation, IT Audit, and Security Assessments Services. In the past few years, we have provided many security solutions to Hong Kong Government Departments and enterprise customers.

In addition to our product offering, UDS also provides professional services including project management, customization, consultation, integration, solution design, implementation and training.

To be specialized in the Information Security field, and clouding services most of our technical staff have obtained industry-recognized information security certification such as CEH, CISA, CISM, CRISC, CDPSE, CBCP and CISSP with the Project Management Professional.

We understand IT security is a key to your business success. Our IT security consulting service is design to help you to minimize and mitigate the potential risk and vulnerability to your business and ensure your business operation is in a protected environment. Our security consulting services include:

  • IT security requirement survey
  • Architect the enterprise IT security infrastructure
  • Feasibility study of IT security implementation
  • Renew and update the security policy and guideline
  • Provide security awareness education and training

Our system design and implementation services provide proven methodologies and best practices that accelerate the time to value of your project investment. Our project implementation services deliver on schedule, outstanding design, implementation, and integration services—in every engagement, in every location.

In addition to system implementation, we also provide profession training service to help customer to adopt the new technology and system rapidly.

A key benefit of working with UDS implementation team is the proven project management skill that is used along with skilled consultants to reduce risk and manage projects to on-time delivery within budget.

We provide 8×5, 7×24 onsite or remote support.

We offer security audit and assessment service to enable your business constantly meet the industry security best practice and your IT asset are well protected. Our aduit and assessment services include:

  • IT system infrastructure review
  • Internal security assessment test
  • External security assessment test
  • Renew security guides
  • Renew the security policy setting in various device and system such as windows server, Unix server, firewall, VPN, Anti-Virus systems etc.
  • Penetration Test, Vulnerability scanning, Security Policy Review, Source code scanning, Security awareness training
  • Security Assessment is generally referring to a Vulnerability Assessment which scans an organization’s infrastructure and identifies vulnerabilities (faulty firewall, lack of system updates, malware, etc.). With the assessment results, the technician can recommend steps to remedy the problems within the system.
  • A penetration test, or sometimes pentest, is a software attack on a computer system that looks for security weaknesses, potentially gaining access to the computer’s features and data
  • vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.
  • Policies should be reviewed at planned intervals to ensure their continuing suitability, adequacy, and effectiveness.
  • Source code scanning is  to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with such a high degree of confidence that what’s found is indeed a flaw.
  • Security Awareness Training will educate employees about corporate policies and procedures for working with information technology (IT).  Employees should receive information about who to contact if they discover a security threat and be taught that data as a valuable corporate asset.
×
×

Cart