ShareTech Next-Gen UTM

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Enabling Secure Internet Access with ISA Server
Network Systems Sales LLC
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
ShareTech Wireless UTM WF Series. Here comes your footer Page 2 ShareTech WF UTM Age of Changes ShareTech Wireless UTM Traditional Wireless UTM vs ShareTech.
Introducing Quick Heal Terminator.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Lesson 19: Configuring Windows Firewall
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
ShareTech Eye Cloud Service System. Here comes your footer Page 2 Eye Cloud Service System Stage of Development ShareTech Information Co., Ltd. Early.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
ShareTech 2015 Next-Gen UTM.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Vantage Report 3.0 Product Sales Guide
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Firewall Policies. Module Objectives By the end of this module participants will be able to: Identify the components used in a firewall policy Create.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Lesson 11: Configuring and Maintaining Network Security
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 10 Securing the network perimeter.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
Network Security Solution
UTM Content Security Gateway
TMG Client Protection 6NPS – Session 7.
Top 5 Open Source Firewall Software for Linux User
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
Firewalls Chapter 8.
Designing IIS Security (IIS – Internet Information Service)
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

ShareTech Next-Gen UTM UR Series

ShareTech Next-Gen UTM Common network intrusion methods Hacking Prevention Network Query Identity Intrusion Prevention QoS Encrypted Connection Security Audit Layer 7 APP Control Virus Filters Intrusion, Sniffer, illegal connection DHCP MAC, IP Layer 2, ICMP, TCP UDP Anomaly VoIP P2P SSL VPN SOX HIPPA IM URL SMTP/POP3 Http FTP Gateway Security Network Auth. Auditing ShareTech Information Co., Ltd. Page 2

ShareTech Next-Gen UTM Competitive Advantages for SMB Before Now Anti-Spam Anti-Virus Load Balance QoS ShareTech Information Co., Ltd. Page 3

ShareTech Next-Gen UTM Solve Your Network Problems ShareTech Information Co., Ltd. Page 4 Page 4

About ShareTech Information Co., Ltd. Company Profile Present Stage More than 50% employees is RD Mail Server UTM/ Wireless UTM WF Solution (+AP) Developing Stage OEM First hardware-based Mail Server in 2004 Software Development Firewall Flow Analysis, Watchlan… Early Stage Small Device Agent (Modem/IP Router) System integration 1999-2000 2000-2010 2014- Founded In 1999 ShareTech Information Co., Ltd. Page 5

Becoming Our Agent What you need to know before getting starteded Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec Service and Support Success Stories ShareTech Information Co., Ltd. Page 6

Target Markets Strategy Becoming Our Agent Our Vision - Becoming a leading Network Security Brand Target Markets Strategy Government Organization Schools Financial Teleservice Business SOHO SMB Middle Business Rental Internal Co-Defense Integrated with Switch Complete Online Behavior Record Sound Management Online behavior, APP, QoS control Cloud CMS Make sure each spot functioned well AP Management Secure wired & wireless network ShareTech Information Co., Ltd. Page 7

ShareTech Next-Gen UTM Four Major Features Security Protection Internal Control Anti-Virus, Anti-Spyware, Anti-Phishing, Anti-DoS, Anti-Hacking and Anti-Relay IDP & Botnet Co-Defense Policy Control (QoS/VPN/Auth.) Filter APP Content Filter Mail Audit Network Load Balancing Record-based Monitoring Easy Management Incoming/Outgoing mail record IM record FTP download record Encrypted SKEYP & QQ record Event log Webpage Management CMS AP Control Bulletin Board Flow Reports ShareTech Information Co., Ltd. Page 8

ShareTech Next-Gen UTM Security Protection - IPv4/v6 Dual Stack ShareTech Next-Gen UTM IPv6 Certification Some parts of the world have already exhausted their IPv4 allocations. ShareTech UTM supports IPv4-only, IPv6-only, and dual-stack for each host. UR Series have been certificated with “IPv6 Ready” logo by the IPv6 forum. ShareTech Information Co., Ltd. Page 9

ShareTech Next-Gen UTM Security Protection - Anti-Virus ShareTech Next-Gen UTM firewall provides advanced threat protection such as anti-virus gateway and anti-spam gateway. With network security in place, Web and email pass through multiple threat detection engines. Security problems can be detected in real time. Automatic Anti-Virus Signature Update: email viruses spread quickly through the network. ShareTech uses Clam AV that can be efficient in providing real-time protection to eliminates viruses, spyware, and other malware. Viruses embedded within incoming and outgoing mail, www., and FTP will be discovered and blocked by virus scanning. ShareTech Information Co., Ltd. Page 10

ShareTech Next-Gen UTM Security Protection - IDP (Instrusion Detection Prevention) Signatures : Default (2243), Custom IDP Policies: Multiple, Custom Deep Packet Inspection: inspect the packets from OSI layer 4 - 7 (app layer) Protocol Anomaly Detection Risk management: 3 levels (High, Medium, Low) ShareTech Information Co., Ltd. Page 11

ShareTech Next-Gen UTM Security Protection - BotNet “BotNet” (known as Zombie Network). A bot can be left for future activation, typically runs hidden and uses IRC to communicate with its Command and Control (C&C) server. When a command is released from the "controller", your computer performs automated tasks over the Internet. Being a vulnerable server, it will send spam distribution to many computers. ShareTech UTM integrated with BotNet with in-built NAT which can explicitly point out the real attack running hidden and suspense malicious software spreading in the internal network. ShareTech Information Co., Ltd. Page 12

ShareTech Next-Gen UTM Security Protection - Anomaly Flow Analysis Network Anomaly Detection ARP Spoofing Detection Prevent the spread of known worm Auto Prevention Session Log Access Control - Quarantine, QoS, Rate limit, IP/MAC ShareTech Information Co., Ltd. Page 13

ShareTech Next-Gen UTM Security Protection - ARP Spoofing Protection ARP Spoofing is to send fake ARP messages to LAN. Its aim is to associate the attacker's MAC address with the IP address and leads to network connection failure. The first feature of ARP spoofing is data intercepted by the gateway. All the data can only be sent to the wrong MAC address, resulting in a normal PC not receiving the message. And the second is establishing forged gateway, so it is a cheating gateway issued false data to the PC, rather than going through the normal means of access routers. ShareTech UTM uses scheduled MAC addresses update technique to avoid changing MAC to IP address entries by ARP attackers. ShareTech Information Co., Ltd. Page 14

ShareTech Next-Gen UTM Security Protection - Co-Defense Cooperated with an SNMP managed switch, administrators can find out problematic devices via the UTM management interface, and control the devices (allow or block) instantly. ShareTech Information Co., Ltd. Page 15

ShareTech Next-Gen UTM Security Protection - High Avaibility (HA) ShareTech UTM provides high availability solution that provides highly available services at all times. Master system normally has priority for serving as a gateway. Master and Slave systems get connected and keep the data synchronized. HA offers continuous access to business-critical applications, information, and services. Supported in UTM Series ShareTech Information Co., Ltd. Page 16

ShareTech Next-Gen UTM Internal Control - QoS Smart QoS provides different priorities between individual users and applications. ShareTech UTM provides QoS-guaranteed wired network. Personal bandwidth setting can be made for personal requirements. QoS can be applied together with personal QoS, and then bandwidth reservation can be made. It reserves remaining bandwidth automatically and dynamically allocates between users in real time. ShareTech Information Co., Ltd. Page 17

ShareTech Next-Gen UTM Internal Control - Failover Backup (Load Balance) Outbound Load Balance Auto distribution Manual distribution Distributed based on source Distributed based on destination IP Inbound Load Balance Analysis of distributed DNS Analysis of host connections ShareTech Information Co., Ltd. Page 18

ShareTech Next-Gen UTM Internal Control - APP Control In-built various APP access control techniques Easy-to-manage network security Monitor employee wireless network usage ShareTech Information Co., Ltd. Page 19

ShareTech Next-Gen UTM Internal Control - Web Filtering Web Filtering blocks access to sites which contains violence, adult material and unauthorized websites which contains hackers and virus. Administrators can define a set of policies to reduce exposure to legal liability. ShareTech Information Co., Ltd. Page 20

ShareTech Next-Gen UTM Internal Control - URL Database Built-in “Cloud URL Database” which automatically categorized webpages, administrators can easily block the vicious URL websites by clicking on the target categories instead of entering website IP address and keywords one by one. The database collects almost 1, 000, 000 URLs and updates every period of time without additional charge. All these URLs and their contents were analyzed and classified into 12 categories. ShareTech Information Co., Ltd. Page 21

ShareTech Next-Gen UTM Internal Control - Authentication Built-in integrated authentication mechanisms such as Local AD/POP3/Radius Servers are provided to authenticate users. Administrators monitor all user accounts in the internal network which reduces cost and increases business efficiency. Only users with valid account and password are allowed to enter the internal network. ShareTech Information Co., Ltd. Page 22

ShareTech Next-Gen UTM Internal Control - IPSec VPN Built-in IPsec VPN secures the site-to-site connections. After passing authentication, more than two devices are allowed to access the same network and transmit encrypted data over the virtual private network. Configuration for the LAN-to-LAN IPsec tunnel GRE over IPSec tunnels supported VPN tunnels can be established after tunnel users (endpoints) are authenticated using valid account name and password. Other VPN devices supported ShareTech Information Co., Ltd. Page 23

ShareTech Next-Gen UTM Internal Control - PPTP Server/Client VPN PPTP VPN offers point to point connection for employee at home. PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel which enables employee get access to industry’s network securely and easily. Configuration for VPN PPTP Server/Client tunnel Options at Client side: -Using ShareTech VPN Broadband Router -Windows/UNIX/Linux PPTP Client software Other VPN devices supported ShareTech Information Co., Ltd. Page 24 Mal Server Web Server

ShareTech Next-Gen UTM Internal Control - SSL VPN SSL VPN provides extensive network access control methods. Remote users are requested to established security policies based on the 2 directions. - entering internal network - entering VPN Server network. Using web browsers (IE, Firefox, Opera) and open webpage, enter company IP at the address bar. Enter connection information (SSL VPN username and password). ShareTech Information Co., Ltd. Page 25

ShareTech Next-Gen UTM Record-Based Monitoring - Spam Filtering ShareTech UTM employs multiple spam mechanisms: ST-IP network rating, Fingerprinting, Bayesian Filtering, Auto learning, Auto-whitelist, system and personal Blacklist/Whitelist and Spam characteristics filtering. Personal blacklist/whitelist and auto-learning can be activated in more flexible policies for high accuracy spam filtering. ShareTech Information Co., Ltd. Page 26

ShareTech Next-Gen UTM Record-Based Monitoring - Mail Auditing Default Conditions Combined Conditions Sender/Receiver Sender source IP Mail title Mail subject Mail content Mail capacity Attachments Instant Action Quarantine Delete Block IP Send copy Notification Adjust Spam Scores Disable Spam Filter 3. Detection 4. Actions Taken Filter Policies Policy Engine 2. Outbound Email 5. Good Mail Company & Mail Record Rules Intellectual Property Rights Responsibility Laws Invasive Data Sensitive Data Legitimacy of Control HIPAA (Health Insurance Portability and Accountability ) SoX (Sarbanes-Oxley) Private Information Protection Law 1. Rules and Legitimacy ShareTech Information Co., Ltd. Page 27

ShareTech Next-Gen UTM Record-Based Monitoring - Online Behavior Tracking Record files transfer over WEB, Mail (POP3 and SMTP), FTP, chat history over instant messaging (Yahoo, ICQ, IRC, Gadu, Jabber), and chat history and files transfer over encrypted Skype and QQ. ShareTech Information Co., Ltd. Page 28

ShareTech Next-Gen UTM Record-Based Monitoring - Web Browsing History Web browsers record stores a list of page title, time of visit and tracks visited websites. Clicking on web history links displays scanned webpages at the moment. ShareTech Information Co., Ltd. Page 29

ShareTech Next-Gen UTM Record-Based Monitoring - Email Delivery Record All incoming and outgoing mail will be recorded along with attached files. Email record can be exported to a separate EML file which is most likely to be saved in and read in any operating system. ShareTech Information Co., Ltd. Page 30

ShareTech Next-Gen UTM Record-Based Monitoring - Instant Messaging Record IM record results include start time, chat time, computer name, IP address, IM type, account, speaker, and content. Clicking on the content icon, the detailed chat history will display. ShareTech Information Co., Ltd. Page 31

ShareTech Next-Gen UTM Record-Based Monitoring - Encrypted Skype/QQ Record In addition to user access control, complete content record (text and file transmission) and search box are provided for administrators to find chat history fast via the friendly interface. ShareTech Information Co., Ltd. Page 32

ShareTech Next-Gen UTM Easy Management - Central Management System (CMS) Increase operation and distribution efficiency Avoid costly mistakes and significantly reduce costs in network management Manage customers distributed in different areas Manage distributed appliances installation across remote offices and clients with ease ShareTech Information Co., Ltd. Page 33

ShareTech Next-Gen UTM Easy Management - AP Management ShareTech UTM monitors operational status, online user status via the management interface. Administrators gain controls over flow, delivery, AP groups and access to the internal wireless network. ShareTech Information Co., Ltd. Page 34

ShareTech Next-Gen UTM Easy Management - Flow Reports Chart type options allow administrators to custom how the chart types (bar, pie, line, table) or texts will be displayed at the top of the report. ShareTech UTM displays operation status for the time frame specified (day, week, month), including CPU/RAM/modification times/security level/ flow monitor reports. ShareTech Information Co., Ltd. Page 35

Becoming Our Agent What you need to know before getting starteded Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec Service and Support Success Stories ShareTech Information Co., Ltd. Page 36

ShareTech Product Series and Spec Product Line Extension Large Enterprise Recommended Users: 400~1000 Middle-sized Business Recommended Users: 200 SMB Recommended Users: 100 Performance Branch Office Recommended Users: 50 UR-930 UR-935 UR-938 UR-955 UR-958 UR-959 UR-760 UR-760F UR-910 UR-915 UR-918 HiGuard Pro Business Size – Recommended Users Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, IPv4/v6, QoS, Load Balance, VPN, SSL VPN , Record, Content Filter… Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, Co-Defense, Audit, IPv4/v6, QoS, Load Balance, VPN, SSL VPN, Record, Flow Analysis, Content Filter…. Anti-Virus, Anti-Spam, Firewall, IPv4/v6, QoS, Load Balance, VPN, Record, Content Filter… Firewall, IPv4/v6, QoS, Load Balance, VPN, Content Filter… ShareTech Information Co., Ltd. Page 37

ShareTech Product Series and Spec UR Series HiGuard Pro Throughput: 600Mbps 160,000 sessions VPN: 78Mbps 2WAN/1LAN/1DMZ Desktop UR-910 Throughput: 600Mbps 170,000 sessions VPN: 85Mbps 2WAN/1LAN/1DMZ 1U UR-915 Throughput: 600Mbps 170,000 sessions VPN: 85Mbps 2WAN/1LAN/1DMZ 1U UR-918 Throughput: 600Mbps 170,000 sessions VPN: 85Mbps HTTP Anti-Virus: 65Mbps 2WAN/1LAN/1DMZ 1U UR-930 Throughput: 950Mbps 600,000 sessions VPN: 240Mbps HTTP Anti-Virus: 120Mbps 2WAN/1LAN/1DMZ 1U UR-935 Throughput: 950Mbps 620,000 sessions VPN: 280Mbps HTTP Anti-Virus: 124Mbps 4WAN/1LAN/1DMZ 1U ShareTech Information Co., Ltd. Page 38

ShareTech Product Series and Spec UR Series Throughput: 960Mbps 620,000 sessions VPN: 290Mbps HTTP Anti-Virus: 124Mbps 4WAN/1LAN/1DMZ 1U UR-955 Throughput: 1,000Mbps 1,850,000 sessions VPN: 650Mbps HTTP Anti-Virus: 350Mbps 4WAN/1LAN/1DMZ 1U UR-958 Throughput: 1,000Mbps 1,850,000 sessions VPN: 650Mbps HTTP Anti-Virus: 350Mbps 4WAN/1LAN/1DMZ 1U UR-959 Throughput: 1,600Mbps 1,850,000 sessions VPN: 650Mbps HTTP Anti-Virus: 350Mbps 4WAN/1LAN/1DMZ 1U UR-760 Throughput: 4,800Mbps 2,000,000 sessions VPN: 830Mbps HTTP Anti-Virus: 1,080Mbps 4WAN/3LAN/1DMZ 1U ShareTech Information Co., Ltd. Page 39

ShareTech Product Series and Spec Comparison and Contrast - SMB HiGuard Pro UR-910 UR-915 UR-918 UR-930 UR-935 UR-938 HD X 250G Suggested Users Under 70 50-75 50-100 100-200 Firewall O Outbound Inbound CMS+AP Control Co Defense VPN SSL VPN Anomaly Block IDP & BotNet Anti-Spam Anti-Virus URL Database Content Record Reports/Audit Option / X X / X Option / Option X / X ShareTech Information Co., Ltd. Page 40

ShareTech Product Series and Spec Comparison and Contrast - Enterprises UR-955 UR-958 UR-959 UR-760 UR-760F HD 500G 300G 2.5’ Suggested Users Under 400 Under 600 600-1000 Firewall O Outbound Inbound CMS+AP Control Co Defense VPN SSL VPN X Anomaly Block IDP BotNet Anti-Spam Anti-Virus URL Database Content Record Reports Audit Option ShareTech Information Co., Ltd. Page 41

Becoming Our Agent What you need to know before getting starteded Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec. Service and Support Success Stories ShareTech Information Co., Ltd. Page 42

ShareTech Service and Support Heaquarter, Branches in Taiwan & Oversea Market Expansion China, Japan, Philippine, Indonesia, Malaysia, Thailand, Vietnam, Bangladesh, Lebanon 2001 Taipei 2005 Shanghai 1999 Taichung 2006 Kaohsiung ShareTech Information Co., Ltd. Page 43 ShareTech Information Co., Ltd. Page 43

Becoming Our Agent What you need to know before getting starteded Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec. Service and Support Success Stories ShareTech Information Co., Ltd. Page 44

ShareTech Success Stories Business ShareTech Information Co., Ltd. Page 45

ShareTech Success Stories Governments and Schools ShareTech Information Co., Ltd. Page 46

ShareTech Online Demo Try it online! http://www.sharetech.com.tw/web_eng/main.php?type=support&down=On-Line%20Demo ShareTech Information Co., Ltd. Page 47

Technical Support Sales Inquiry ShareTech Information Co., Ltd. www.sharetech.com.tw Technical Support help@sharetech.com.tw Sales Inquiry sales@sharetech.com.tw ShareTech Information Co., Ltd. Page 48