Database

Startups

Main Industry
Privacy and Security
Main Product/Service
1. A10 Defend
2. A10 Infrastructure
3. A10 Infrastructure
Founded Year
2010
Unified Business No.
25139142
Status
Active
Number of Employees
0
Total Paid-in Capital
0 (NT$)
Location of Company
Taiwan , Taipei City
Year of establishment, company status, responsible person, paid-in capital amount, and registered address are sourced from the "Commerce Industrial Services Portal, Department of Commerce, MOE. Exit status refers to various situations, including emerging stock exchanges (e.g., potential exits), mergers and acquisitions (M&A), and IPOs. The overseas development countries are collected through information provided by startups themselves and the information filled in when registering for matchmaking events. Therefore, the information cannot be updated in real time. If you wish to make corrections, please email findit.tier@gmail.com. Thank you. Notice: This data is compiled from public sources for reference only. We have no direct affiliation with the company and are not their contact person. Please do not contact this platform for company inquiries.
About the Company
Our core values are:
Customer-centricity. We are customer-centric in everything we do.
Innovation. We provide innovative and bold solutions for better business outcomes.
Collaboration. We collaborate to win together.



More ↓

Similar Companies

CYCARRIER TECHNOLOGY CO., LTD.

1. XENSOR Next-Generation MDR Endpoint Security
Combines machine learning with proprietary FTA forensics to automate threat triage, remote incident investigation, and threat hunting. By integrating multi-dimensional intelligence—user behavior analytics, memory forensics, endpoint forensics, and network analysis—it delivers proactive detection without relying on signatures, reducing security response costs.

2. CYBERTOTAL Global Threat Intelligence Platform
Aggregates worldwide CTI sources and APT intelligence to provide high-quality, AI-correlated threat insights. Goes beyond traditional blacklist sharing (IP, domains, hashes) to help organizations quickly identify threats and validate alerts.

3. CYCARRIER AI-Driven SOAR Command Center
Automatically correlates data collected by AI bots to analyze attacks and generate situational dashboards. Provides attack timelines and visualizations, reduces SOC workload, produces detailed threat reports, and supports API-based integrations (SNORT, YARA, STIX) to enhance investigation and response efficiency.