Japan IT Week Spring 2018

Japan IT Week is truly world’s leading trade show where you can find any kinds of latest IT technologies/solutions. A great number of information systems manager, management executives, sales managers, system integrators and managers from IT system division will visit Japan IT Week to conduct business face to face with exhibitors. Japan IT Week is absolutely meeting point for both IT solution providers and IT system managers.

 

Visit DT Asia Group at booth # E44-31 (Information Security Expo Area)

Dates
May 9 (Wed)- 11 (Fri), 2018 10:00-18:00 (Last day until 17:00)
Venue
Tokyo International Exhibition Center (Tokyo Big Sight), Tokyo, Japan
Address: 3-11-1 Ariake, Koto-ku, Tokyo, Japan 135-0063
Organised by
Reed Exhibitions Japan Ltd.
Japan IT Week Spring consists of:
27th Software & Apps Development Expo (SODEC)
23rd Big Data Management Expo (BIG DATA Spring)
21st Embedded Systems Expo (ESEC Spring)
20th Data Storage Expo (DSE)
15th Information Security Expo (IST Spring)
12th Web & Digital Marketing Expo (Web-Mo Spring)
10th Data Center Expo (DATA CENTER Spring)
9th Cloud Computing Expo Japan (CLOUD JAPAN Spring)
8th Mobile Solutions Expo (MOBIX Spring)
7th IoT/M2M Expo Spring
6th Direct Commerce Solutions Expo (DIREX Spring)
2nd Store & Retail IT Solutions Expo (STOREX Spring)
1st AI & Business Automation Expo (Spring)
Visitor Profile
End Users from Information Systems Dept., Corporate Managers/Cooperate Management Dept., Sales Dept., Marketing Dept., General Affairs Dept., Human Resources Dept. and Accounting Dept., SaaS Providers, Software/Systems Development Companies, Data Center Operators, System Integrators (SI)

 

About Information Security Expo (IST Spring)

IST

IST is Japan’s largest exhibition featuring all kinds of information security related products and services. A great number of managers representing, risk/security management,information systems, corporate planning, audit and legal affairs visit IST every year to conduct face-to-face business with exhibitors.

Exhibit Profile

Hacking Prevention, DoS Prevention, Anti-Virus Solutions

  • Firewall
  • Anti-Virus, Spam Protection, Phishing Prevention
  • UTM (Unified Threat Management)
  • E-mail Security
  • IDS (Intrusion Detection System) / IPS (Intrusion Prevention System)
  • Quarantine Solutions
    etc.

  • Desktop/Network Monitoring Software
  • WEB/E-mail Filtering
  • Identity Management
  • Document Security, Document Management
  • Database Security, Database Monitoring
    etc.

  • Authentication Services/Software, CA
  • Authentication Devices (IC Cards, Tokens, Smart Cards)
  • Encryption Solutions / PKI-related Products/Services, VPN
  • WEB Access Management, WEB Defacing Prevention Tools

  • Data Delete Tools/Services
  • PC Disposal Services
  • Hard Disk/Removal Disk Recovery Services
    etc.
  • Hard Disk Crushers
  • Data Recovery Tools/Services

  • Security Patch Management Software
  • License Management Software
  • Thin Clients

  • Security Diagnostics, Assessment Services
  • ISMS Certificate Acquiring Support Services

  • Entry/Exit Security Systems
  • Security Cameras, Surveillance Systems etc.

Visitor Profile

  • Risk/Security Systems Administrators and Managers
  • Information Systems Dept. (System Planning/Development/Operation Management Administrators and Managers)
  • Executive Officers/Corporate Planning Dept.
  • Audit Dept.
  • Legal Affairs Dept.
  • Security System Integrators


Related Articles

Crucial backup strategies to defend against ransomware attacks

Ransomware payouts are trending upward once again. According to Chainalysis, a cryptocurrency tracing firm, 2021 saw ransomware payments reach nearly $1 billion—a record high. While there was a decline in 2022, the trend reversed in 2023, with estimated payouts approaching $900 million. This increase in ransomware activity can be attributed to the intensified operations of […]

A Tale of the Three *ishings: Part 3 – What is Vishing?

Over the past two decades, the security industry has made significant strides in using technology to secure technological assets. However, the human factor in cybersecurity often remains overlooked. Consequently, cyber attackers have shifted their focus from targeting technology to targeting people. Among the various methods they employ, the three most common are phishing, smishing, and […]

API monetization models: Strategies to leverage APIs for greater revenue

API monetization models showcase strategies and tactics for using APIs to generate revenue, impacting the bottom line both directly and indirectly. In this blog, we’ll define API monetization, explore different monetization models, and delve into a classic case study. Additionally, we’ll discuss various use cases and steps to consider when designing your API strategy for […]

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance is built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of the typical use cases for SSB (and syslog-ng PE) is optimizing the logging infrastructure for SIEM / log analysis. Two recently introduced SSB […]

Taiwan CyberSec event

Reflecting on an incredible experience at the Taiwan CyberSec event! 🌟 Engaging discussions, groundbreaking insights, and invaluable connections made this event unforgettable. Thank you to all the participants, speakers, and organizers for contributing to this dynamic exchange of ideas. Let's continue working together to enhance cybersecurity worldwide! #DTAsia

Contact DT Asia Group Hong Kong

Address: Unit 929, Kowloon Bay Industrial Centre,
15 Wang Hoi Road, Kowloon Bay, Hong Kong
Tel: +852 58010001
Emailsales@hk.dtasiagroup.com

Like Our Facebook Page :)