Close this search box.

We are creating some awesome events for you. Kindly bear with us.

HK govt lab venture launches new security solutions

In a series of launches, a company operating within the Hong Kong’s Smart Government Innovation Lab has announced that several new solutions.

The company is now seeking start-ups, SMEs or other companies who will apply to acquire and use the technologies.

The three innovations are:

  1. IXIA BreakingPoint

The solution is an all-in-one applications and network security testing platform. It can validate the security posture of networks with real applications and a complete range of threat vectors.

In the current business environment, it is necessary to have an application and security test solution that can verify the stability, accuracy, and quality of networks and network devices.

Thus, BreakingPoint can simulate real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing.

The solution validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%.

And with the firm’s new TrafficREWIND solution, users can get a more realistic and high-fidelity validation by adding production network insight into BreakingPoint test traffic configurations.

Application Areas

The areas of application for the technology include Broadcasting, City Management, Climate and Weather,
Commerce and Industry, Development, Education, Employment and Labour, Environment, Finance, Food, Health,
Housing, Infrastructure, Law and Security, Population, Recreation and Culture, Social Welfare, as well as Transport.


The solution employs Simulation and Training technology.

Key Features

  1. Simulates more than 400 real-world application protocols
  2. Allows for customization and manipulation of any protocol, including raw data
  3. Generates a mix of protocols at high speed with realistic protocol weight
  4. Supports more than 38,000 attacks and malware
  5. Delivers all Real-World Traffic™ simultaneously from a single port, including legitimate traffic, DDoS, and malware
  6. Bi-monthly Application and Threat Intelligence (ATI) subscription updates ensure you are current with the latest applications and threats
  7. Combined with the CloudStorm™ platform, BreakingPoint reaches a staggering performance with a fully-populated chassis—2.4 Tbps / 1.44 billion sessions and 42 million connections per second—to emulate enterprise-wide networks to continent-scale mobile carrier networks
  8. Provides a cyber range environment for hands-on cybersecurity skills development
  1. IXIA ThreatARMOR

ThreatARMOR cuts straight to the core of the problem by automatically blocking much of the network communication that malware needs to download instructions or transmit sensitive data.

It prevents network probes, phishing clicks, and all traffic to and from untrusted countries. This reduces the risk from attacks such as zero-day ransomware mutations along with up to 80% of the malicious connections that threaten the network and generate floods of security alerts.

Ixia’s ATI Research Center provides an always-on stream of geolocation and threat intelligence for ThreatARMOR—individually validating every single blocked IP address, every single day.

Detailed Rap Sheets provide clear, on-screen proof of malicious activity for all blocked sites to mitigate the risk of false positives.

While next-gen firewalls are great at DPI and threat detection, they are not optimized for massive-scale blocking of malicious, hijacked, and untrusted IP addresses.

Even if they can import a threat intelligence feed, their performance suffers dramatically when trying to block the tens of millions of IP addresses in the Rap Sheet database.

ThreatARMOR complements next-gen firewalls by offloading massive-scale blocking so that they can allocate more resources to content inspection, user policies, VPN termination, and other features while generating fewer security alerts.

Areas of application

The areas of application are the same as those of the aforementioned solution, BreakingPoint.

Technologies Used

The company employed the following technologies in this solution: Artificial Intelligence (AI), Data Analytics, Machine Learning and Predictive Analytics.

Key Features

  1. Provides full line-rate performance
  2. Eliminates 30% of alert-generating connection attempts, and yields a 15x return on investment in a single year
  3. Updates threat data every 5 minutes with cloud-based Application Threat Intelligence (ATI) feed
  4. Delivers clear on-screen proof of malicious activity for any blocked sites
  5. Offers on-box and off-box logging of blocked connections and system events
  6. Features easy 30-minute setup, with no ongoing tuning or maintenance required
  7. Provides an intuitive, on-screen dashboard displaying blocked sites, countries of origin, and statistics
  8. Combined with Ixia Bypass, it switches to provide additional resiliency of ThreatARMOR and other security infrastructure.

3. IXIA Vision ONE (Network Packet Broker)

Ixia Vision ONE provides the ability to deploy resources where they are needed most and secure any traffic in their network.

It acts as the first step to security, providing reliable inline connectivity for security tools such as intrusion prevention systems (IPS), data loss prevention (DLP), and Web firewalls. It simultaneously connects out-of-band monitoring tools like intrusion detection systems (IDS) and data recorders.

Integrated intelligence features enable you to access encrypted traffic using SSL decryption, reduce analysis traffic using advanced packet processing, and precisely select traffic by application type, and geography. Ixia Vision ONE forwards selected traffic in a variety of formats to interoperate with any security tool.

Areas of application

The areas of application are the same as those of the aforementioned solutions, BreakingPoint and ThreatARMOR.

Technologies Used

The company employed the following technologies in this solution: Artificial Intelligence (AI), Data Analytics, as well as Machine Learning.

Key Features

  1. A powerful GUI allows for focus on security rather than configuration – the industry-leading user interface and patented filter compiler make configuration simple for both inline and out-of-band topologies
  2. CLI support for NetStack and inline features
  3. Active SSL the ability to decrypt and re-encrypt traffic as an active SSL proxy for both inline and out-of-band tool deployments. Offloads the SSL burden from tools to improve ROI and security performance
  4. Passive SSL decryption provides downstream security tools with plain text content, so they do not need to support or incur the performance overhead of decrypting traffic to find hidden threats
  5. VOIP / VoLTE support provides correlation, sampling and whitelisting of SIP/RTP traffic. Allows visibility into Evolved Packet Core (EPC) and IP Multimedia Core Network Subsystem (IMS) interfaces based on SIP messaging
  6. Zero-loss advanced packet processing improves security tool efficiency through techniques such as deduplication and packet trimming without dropping packets
  7. Classify traffic in real-time with hundreds of pre-loaded application signatures, and direct it to the correct tool according to parameters such as application type, geolocation, or even handset type—so tools get just the traffic type they need, again optimizing your investment in tool infrastructure
  8. Sophisticated load balancing distributes traffic across several tools for monitoring or inline in serial or parallel to maximize up-time and ensure that no critical data is lost
  9. Comprehensive wizards make inline tool deployment extremely easy for complex use cases that require tool sharing or VLAN translation
  10. Space efficient 1RU design saves rack space in your data centre
  11. Secure serial console port with authentication


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


CTC Global Singapore, a premier end-to-end IT solutions provider, is a fully owned subsidiary of ITOCHU Techno-Solutions Corporation (CTC) and ITOCHU Corporation.

Since 1972, CTC has established itself as one of the country’s top IT solutions providers. With 50 years of experience, headed by an experienced management team and staffed by over 200 qualified IT professionals, we support organizations with integrated IT solutions expertise in Autonomous IT, Cyber Security, Digital Transformation, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Well-known for our strengths in system integration and consultation, CTC Global proves to be the preferred IT outsourcing destination for organizations all over Singapore today.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.