Home Solutions & Products Solutions

Solutions & Products

Solutions

Through ACSI’s solutions, we assist enterprises in comprehensive cybersecurity defense to confront the cyber threats.

link

Forensic

Information security defense covers a wide range, and even with a robust defense in depth strategy, it remains challenging to guarantee the absence of unexpected events in the face of continuously emerging vulnerabilities and active hacker groups.

link

SOAR

SOAR (Security Orchestration, Automation, and Response)

link

MDR

Our Managed Detection and Response (MDR) service is tailored to the Endpoint Detection and Response (EDR) solution chosen by the client.

link

Consulting Service of ISMS - Implementation

ISO/IEC 27001 is a set of international standard on information security management, which emphasizes on establishing and maintains the ISMS (Information Security Management System) under the development model of "Plan-Do-Check-Action".

link

Risk Assessment on Personal Information

The Personal Information Protection Act has taken effect nowadays.

link

Drill Service of Distributed Denial-of-Service Attack

ACSI developed a Distributed Denial-of-Service (hereafter referred to as DDoS) attack system for the purpose of drill, which by using a lot of distributed attack sources providing attack scenario which emulates utmost reality.

link

SOC as a Service

Managed Security Services (MSS) refers to a service where organizations or enterprises outsource the monitoring of their cybersecurity devices (such as firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, Web Application Firewalls, Active Directory, and antivirus software) or core system logs to professional cybersecurity vendors.

link

System Vulnerability Assessment

Due to the increasing complexity of online activities, most hackers exploit known system vulnerabilities to write attack codes (Exploit Code) for infiltrating corporate information systems.

link

Website Vulnerability Assessment

ACSI powerful cybersecurity technology teams, armed with extensive and practical experience, following the OWASP Top 10 international detection standards and in collaboration with internationally renowned web vulnerability scanning tools, software scanning adheres to OWASP TOP 10 or product standard detection rules.

link

Penetration Testing

A penetration test (PT) is a basic simulation for hacking attacks. Regular PT is essential to ensure that websites are secure enough to withstand external malicious attacks.

link

Social Engineering Drill

In addition to relying on various cybersecurity devices and products for detection and defense functions, good user habits and effective management measures are also crucial for cybersecurity protection.

link

Information Security Health Check

Information Security health check services integrate inspections of various information security aspects, offering clients recommendations for enhancing cybersecurity.