­º­¶> ¨¾¬r¦w¥þ³nÅé

>>ÂsÄý©Ò¦³TrendMicroÁͶը¾¬r¦w¥þ³nÅé

TrendMicroÁͶÕ
TrendMicroÁÍ¶Õ Web Security

«¬¸¹¡GTrendMicroÁÍ¶Õ Web Security


TrendMicroÁͶÕTrendMicroÁÍ¶Õ Web Security


°Ñ¦Ò°â»ù¡G½Ð¥ß§Y¨Ó¹q ¤O±ô¸ê°T
( »ù®æ¯}Ãa¦æ±¡¡I¨Ó¹q¬¢¸ß)



ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security - ¨¾¬r¦w¥þ³nÅé
³Ì¦nªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security±ÄÁÊ¿ï¾Ü´N¦b ServerBank!
¶W¦h´Ú¨¾¬r¦w¥þ³nÅé Åwªï±z¨Ó¹q°Q½×±ÄÁʻݨD¡A²{¦b§ó¦³¦h­«Àu´f¤è®×³á
¥»¯¸°Ó«~§¡¸û¦P·~»PºôÁÊ«K©y,¥ø·~ªø´Á±ÄÁÊ ¶q¤j¥t¦³§é¦©³á!  
 ServerBankÂX¤j©Û¶Ò·~°È¦P¤¯¡I

°Ñ¦Ò°â»ù¡G( ¯}Ãa¦æ±¡¼t°Ó¬IÀ£¡I)
¸ß°Ý¥ô¦óTrendMicroÁͶլÛÃö²£«~½Ð¥ß§Y¨Ó¹q
¤O±ô¸ê°T ServerBank ¹q¸Ü:(02)8969-0901
¸ß»ùEmail service@serverbank.com.tw



·|­û»ù>>¯Á¨ú¦¹°Ó«~³ø»ù
¦Û°Ê¦C¦L³ø»ù³æ(¤´¥i¨Ó¹q¸ß°Ý§é¦©´T«×)


ÂsÄý³W®æ¬Ûªñ¤§TrendMicroÁͶղ£«~>>
ÂsÄý³W®æ¬Ûªñ¤§¨ä¥L«~µP²£«~>>






¥[ÁÊ ¼Ð·Ç°t³Æ¥H¥~¤§TrendMicroÁͶխì¼t°t¥ó


¡@

¡@

¡@


TrendMicroÁͶÕ
TrendMicroÁÍ¶Õ Web Security - ServerBank¸ê°T±ÄÁʺô
TrendMicroÁÍ¶Õ Web Security
¨¾¬r¦w¥þ³nÅé


¡@
²£«~³W®æ
·s¼Wºô­¶1

TrendMicroÁÍ¶Õ Web Security

KEY BENEFITS
• Delivers Superior Protection ¡X Any Device, Anywhere: Trend Micro Web Security stops threats directly in the cloud
before they get to your endpoints. Your users will be protected across any device¡Xincluding desktop and mobile
platforms¡Xat any location, whether on the corporate network or not. It delivers comprehensive real-time protection
against the full scope of web threats by using anti-malware, web reputation, and the strongest advanced threat
protection that includes sandboxing and predictive machine learning. Leveraging the real-time protection provided
by our global Trend Micro™ Smart Protection Network™, this solution even has the capacity to defend against new
emerging threats.
• Cloud Application Access Control: Trend Micro Web Security has the ability to identify more than 30,000 cloud
services in use and executes the granular access policy set up by admin. This powerful capability allows you to
configure access control on unsanctioned cloud apps for different users or user groups within a defined schedule,
boosting your organization¡¦s security and productivity.
To make Trend Micro Web Security even more powerful, cloud service filters block personal account access to
sanctioned apps. For example, employees can only use their corporate account to log on to Dropbox™, but are
prohibited from signing in via their personal account, preventing sensitive data from leaking.
• Flexible Deployment Options to Fit Your Needs: This unique deployment model allows you to choose how you
deploy the product, allowing our customers to choose between on-premises, cloud, or both. Cloud-based deployment
for all users, including on-site, branch offices, and remote/mobile users, eliminates the expense and resource
drain associated with backhauling traffic or managing multiple separate on-premises secure web gateways. Hybrid
deployment allows you to deploy the on-premises virtual appliances for large corporate sites while using cloud
web gateway to secure the activity of your smaller branch offices and mobile users. In addition, pure on-premises
deployment can be adopted for on-site users who prefer it.
• Single, Centralized Management Console: One cloud-based management console allows you to manage and
monitor web use in real time. This single pane of glass lets you to manage centralized and unified policies across both
on-premises and cloud-based deployment instances. Interactive and customizable dashboards and reports give you
complete visibility of web usage and security information.

KEY FEATURES
Gateway Anti-Malware and HTTPS Decryption
• Prevents malware from entering your network, relieving the burden on endpoint security.
• Stops virus and spyware downloads, botnets, malware callback attempts, and malware tunneling.
• Closes the HTTPS security loophole by decrypting and inspecting encrypted content.
Web Reputation with Correlated Threat Data
• Trend Micro Smart Protection Network web reputation technology blocks access to websites containing malicious activity.
• Protects against new threats and suspicious activity in real time.
• Identifies and blocks botnet and targeted attack command and control (C&C) communications using global and local threat intelligence.
URL Filtering and Categorization
• Uses real-time URL categorization and reputation to identity inappropriate or malicious sites.
• Stops drive-by downloads and blocks access to spyware and phishing-related websites.
Application Visibility and Control
• Monitors and reports on more than 30,000 cloud applications and 1,000 internet protocols and applications, including instant messaging, peerto-peer, social networking applications, and streaming media.
• Enables granular policy creation to control all web activity.
• User or user groups, gateways, and schedule-based policy enforcement.
Cloud Sandboxing and Predictive Machine Learning
• Cloud sandboxing provides automatic in-depth simulation and analysis of potentially malicious attachments, including executables and
common office documents, in a secure Trend Micro-hosted sandbox environment.
• Predictive machine learning uses mathematical algorithms to act as an extra layer of scanning to filter unknown files before sending the
suspicious files to the cloud sandbox. It increases efficiency and reduces false positives of cloud sandboxing.
Cloud DLP (Data Loss Prevention)
• Uses more than 240 global data loss prevention templates to safeguard digital assets against accidental or deliberate leakage.
• Integrated with Trend Micro Web Security and hosted by Trend Micro, the cloud DLP can be managed in the unified management console.


¡D¥»¤å¥óªº¸ê°T­Y¦³­×§ï¡A®¤¤£¥t¦æ³qª¾¡C
¡D³W®æ©Î³ø»ù­Y¦³»~¡A¥H­ì¼t«¬¿ý©Î¥¿¦¡³ø»ù³æ¬°¥D¡C
¡D¥»ºô¯¸¤º®e©Î¤å¥ó·í¤¤©Ò´£¤Î¤§«~µP¤Î²£«~¦WºÙ©Î¹Ï¤ù§¡¬°¨ä­ì©ÒÄݤ½¥q¤§ª©Åv¡B°Ó¼Ð©Îµù¥U°Ó¼Ð¡C

º¡¤@©w¼Æ¶q©Îª÷ÃBÁÙ¦³¦h´ÚÃØ«~¥i¨Ñ¿ï¾Ü³á! ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security±ÄÁÊ¿ï¾Ü´N¦b ServerBank!


¥æ©ö¤Î¹B°e«O©T»¡©ú

¥æ©ö¤è¦¡¡G
±z¤£½T©w¥H¤W°Ó«~¬O§_²Å¦X±zªº»Ý¨D?¨SÃö«Y¡A§Ú­Ì·|¬°±z¦V­ì¼t½T»{¡C©Î¬O±z§Æ±æ¼W´î¥H¤W°Ó«~¤§³W®æ¹s²Õ¥ó¡A§Ú­Ì³£¥i¼u©Ê°t¦X±zªº»Ý­n³ø»ù¤Î¥X³f¡C ¦p±z¹ï¥H¤W²£«~³W®æ¥H¤Î»ù®æº¡·N¡A¥i³z¹L¥H¤U¤è¦¡¶i¦æ±ÄÁÊ¡G

1.¹q¸ÜÁpô¡G ½Ðª½±µ¨Ó¹q¡G(02)8969-0901
2.ºô¸ô¸ß»ù¡GÂI¿ï¥»­¶ÁʶR¸ß»ù§Ú­Ì·|¥ß§Y»P±zÁpô!
3.¨Ó¨ç¸ß»ùEmail: service@serverbank.com.tw
¥I´Ú¤è¦¡¡G¦p«È¤á¬°­º¦¸¥æ©ö±Ä²{ª÷¥æ©ö¡C
¶Ç¯u­q³æ¡G ª½±µ±N¥¿¦¡³ø»ù³æñ¦W«á¶Ç¯u¦Ü(02)2253-9016 §Y§¹¦¨­qÁʵ{§Ç¡A§Ú­Ì·|©ó³Ìµu®É¶¡¤º¹q¸Ü½T»{­q³æ¡C
±H°e®É¶¡¡G¨Ì³y¤£¦P¼tµP¥N²z°Ó¦³©Ò¤£¦P¡A¤j¦h¼Æ°Ó«~©ó 7 ­Ó¤u§@¤Ñ¯à°e©è«È¤áºÝ¡A§Ú­Ì¦¬¨ì±z­q³æ®É·|¦P®É¦^Âбz½T©w¥æ´Á¡C
°e³f¤è¦¡¡G(1) ­ì¼t©Î¬O¥N²z°Óª½±µ°t°e (2) ¥ÑServerBank©e°U¦v°t©Î¬O³f¹B¤½¥q°e¹F¡C
°e³f½d³ò¡G­­¥xÆW¥»®q¦a°Ï¡A¹B¶O¥Ñ ServerBank ¬°±z­t¾á¡Aª`·N¡I¦¬¥ó¦a§}½Ð¤Å¬°¶l¬F«H½c¡C
°â«áªA°È¡G­Y²£«~¥»¨­·å²«©Î¹B°e¹Lµ{¾É­P·s«~·å²«¡A¨ì³f7¤é¤º¥i§ó´«·s«~¡C
«O©T¬Fµ¦¡G ¹ê»Ú¥H­ì¼t¤Î¥N²z°Ó¤½§i«O©T±ø¥ó¬°¥D¡A¬d¾\Áʪ«»¡©ú»P«O©TªA°È¡C¡@

¤O±ô¸ê°T ServerBank Inc. ²¤¶

¥Ø«e¤w¸g¬°¶W¹L30000®a¥ø·~´£¨ÑIT¸ê°T¬[ºc©Ò»Ýªº³nµwÅé³]³Æ¡A¦U¦æ·~ª¾¦W«È¤á¦p¡G

»s³y·~¡G¥x¿n¹q¡B¤Í¹F¡BÂE®üºë±K¡B¤O´¹¥b¾ÉÅé¡B¦w±¶­Û¡B¥xÆWªFªÛ¡B¥xÆW­^­¸­â¡B¥¿´Q¡B§¡»¨¡B§»¥¿¡B©MºÓÁp¦X¡BªF¶©¡B«Ø¿³¹q¤l¡B­¸§Q®ú©úùÖ¡B®õª÷Ä_¡B¯«³q¡B¯«¹F¡B°¶³Ð¤O¡B±d¥þ¡B°ê²³¡B±á¬P¥b¾ÉÅé¡B¼s¹F¹q¸£¡B¼s¿o¹q³q¡BÁpµØ®ðÅé¡BÄ_¦¨¤u·~¡B¼s¹B¡B

¥~°Ó¡G ¥xÆWNTT¡B¥xÆW·Nªk¥b¾ÉÅé¡B¥xÆWNEW Balance¡B¥xÆWNEC¡B¥xÆWSONY¡B¥xÆW´I¤h¥þ¸S¡B

ª÷¿Ä¡G°ê®õ¤H¹Ø¡B¤¸¤jÃÒ¨é¡B«n¤s¤H¹Ø¡B°ê®õ¥@µØ¡B¥xÆW¤u·~»È¦æ¡B¥xÆWª÷¿Ä¬ã°V°|¡B¤T°Ó¬ü¨¹¤H¹Ø¡B¤j¸Û«OÀI¡Bªk°ê¤Ú¾¤¤H¹Ø¡B«O¸Û¤H¹Ø¡B°êµØ¤H¹Ø¡B²Î¤@ÃÒ¨é¡B´I¨¹¤H¹Ø¡BµØ«n²£ª««OÀI¡B·s¥ú¤H¹Ø¡B¥xÆW²£·~«OÀI¡B

¬y³q¡G ·s¥ú¤T¶V¡B¤T¹´(·L­·¼s³õ)¡B«H¸q©Ð«Î¡Bªü¨½¤Ú¤Ú¡B

Æ[¥ú¡G ¤¤«H¶º©±¡B¶³®Ô¶º©±¡B¤Ó¥­¬v¡BµØ®õ¡B¤»ºÖ¡B¤Ñ²»´¹µØ¡B¬K¤Ñ°s©±¡B»·¶¯®ü¬v¤½¶é¡B

­¹«~¡G ¥xÆWµÒ°s¡B¤Ñ¤¯¯ù¸­¡B¤¸¯ª¡B¥ú¬u¡B·sªF¶§¡B¦w¤ß­¹«~(¼¯´µº~³ù)¡B®õ¤s¡B®üÅQ¤ý¡B²Î¤@¥ø·~¡B¾ó¤ì±í¡B¯ø´µ¸ª¡B«¢¸ò¹F´µ¦B²N²O¡B

´CÅé¡G ³ü¶Ç´C¡BÁp¦X³ø¡B¥xµø¡BµØµø¡B«D¤Z¹qµø¡B¨È¬w¼s¼½¡B­¸ºÐ¼s¼½¡B­·¼é°Û¤ù¡B®É³ø©P¥Z¡B

±Ð¨|¡G ¥xÆW¤j¾Ç¡B¥æ³q¤j¾Ç¡B²MµØ¤j¾Ç¡B¤j¦P¤j¾Ç¡B¤¤¥¡¤j¾Ç¡B¤¤­ì¤j¾Ç¡B¤¤¿³¤j¾Ç¡B»²¤j¡B°ê»y¹ê¤p¡BÂù¶é°ê¤p¡BµØ¿³¤¤¾Ç¡BªFªù°ê¤p¡B¥x¬ì¤j¡B©ú§Ó¡BªF§d¡BªF®ü¹qºâ¤¤¤ß¡Bªø©°¤j¾Ç¡B«n¨È§Þ³N¾Ç°|¡B¨ÈªF¡B«nªù°ê¤¤¡B¥x®v¤j¡BªFµØ¡B¶§©ú¡B¶³¬ì¤j¡B¦Ë®v¡Bº[«n¤j¾Ç¡B±X¤s¬ì¤j¡B²H¦¿¡B²M¶³¡B³{¥Ò¡B

²Õ´¡G «H«O°òª÷¡B«C³Ð·|¡B¤¤¤p¥ø·~¨ó·|¡BºÞ²z¬ì¾Ç¾Ç·|¡B­ì¦í¥Á±Ú¤å¤Æ±Ð¨|¨ó·|¡B¸êµ¦·|¡B¥xºô¤¤¤ß¡B¶³ªù»R¶°

¬F©²¡G ¤¤¬ã°|¡B¤¤¬ì°|¡B°·«O§½¡B¤Ñ¤å¬ì±ÐÀ]¡B¦Á¤îĵ§½¡BªO¾ô¹A·|¡B¥x¥_¿¤®ø¨¾§½¡B°ê½Ã°|¡B®ü¥ÍÀ]¡B°ê¦w§½¡B

ÂåÀø¡G ¥x¤jÂå°|¡B®¦¥D¤½Âå°|¡B¥_¨Ê¦P¤¯°ó¡B®H¨½°ò·þ±ÐÂå°|¡B¸¯Äõ¯À¥v§J¡Bù¤ó¤jÃļt¡B¥Ã«HÃÄ«~¡B

¹q«H¡G ¤j²³¹q«H¡B¥xÆW©Tºô¡B»·¶Ç¹q«H¡B

¥æ³q¡G ¥x¥_±¶¹B¤½¥q¡BµØ¯è¡B¤­±]±¶¹B¡B¥xÆW´¼¼z¥d¡B

¤½¯q¡G³ßéw¨à¡B¥ì¨l¡B¶§¥ú°òª÷·|¡B»Z¤½­^¡B¿ßÀYÆN

©v±Ð¡G ¤¤¥xÁI¦x¡B°ò·þ±Ð¦æ¹D·|¡B°ò·þ±Ð®û«H·|¡B

­x¤è¡G ªÅ­x¥q¥O³¡¡B°ê¨¾Âå¾Ç°|¡B

 

 


¡@
         ServerBank ¥Ñ¤O±ô¸ê°TªÑ¥÷¦³­­¤½¥q«Ø¸m@
         ·s¥_¥«ªO¾ô°Ï¤å¤Æ¸ô¤@¬q268¸¹3¼Ó
         ¹q¸Ü:
(02)8969-0901
          service@serverbank.com.tw
          www.ServerBank.com.tw
ServerBank¤O±ô­º­¶

¥þ³¡¤ÀÃþ | ¦Cªí | «~µP | ¶i¶¥·j´M | §Þ³N¤ä´©
¡@
¡@
¹q¸Ü(02)8969-0901
¡@
 ¨¾¤õÀð
 ¨¾¬r
 ¬¡°ÊºÊ±±
 ÁͶÕ
 ÁɪùÅK§J
 McAfee
 SOPHOS
 NOD32
 ¥d¤Ú´µ°ò
 Panda
 eTrust
 ¦¿¥Á
 bullguard
 BitDefender
 G DATA
 IP-Scan
 Norman
«P¾P¬¡°Ê



¡@


ServerBank ¤O±ô¸ê°TServerBank¸ê°T±ÄÁʺô > ¨¾¬r¦w¥þ³nÅé


TrendMicroÁͶÕTrendMicroÁÍ¶Õ Web Security

TrendMicroÁÍ¶Õ Web Security


¼tµP¡GTrendMicroÁÍ¶Õ      >>ÂsÄýTrendMicroÁͶեþ³¡²£«~
«¬¸¹¡GTrendMicroÁÍ¶Õ Web Security



ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security±ÄÁÊ¿ï¾Ü´N¦b ServerBank!
¶W¦h´Ú¨¾¬r¦w¥þ³nÅé Åwªï±z¨Ó¹q°Q½×±ÄÁʻݨD¡A²{¦b§ó¦³¦h­«Àu´f¤è®×³á
¥»¯¸°Ó«~§¡¸û¦P·~»PºôÁÊ«K©y,¥ø·~ªø´Á±ÄÁÊ ¶q¤j¥t¦³§é¦©³á!  

 

°Ñ¦Ò°â»ù¡G( ¯}Ãa¦æ±¡¼t°Ó¬IÀ£¡I)
¸ß°Ý¥ô¦óTrendMicroÁͶլÛÃö²£«~, ½Ð¥ß§Y¨Ó¹q(02)8969-0901
¤O±ô¸ê°T ServerBank ¸ß»ùEmail: service@serverbank.com.tw



·|­û»ù>>¯Á¨ú¦¹°Ó«~³ø»ù


ÂsÄý³W®æ¬Ûªñ¤§TrendMicroÁͶղ£«~>>
ÂsÄý³W®æ¬Ûªñ¤§¨ä¥L«~µP²£«~>>
¦Û°Ê¦C¦L³ø»ù³æ(½Ð¨Ó¹q¸ß°Ý§é¦©­°´T)






ServerBankÂX¤j©Û¶Ò·~°È¦P¤¯¡I
¥[ÁÊ ¼Ð·Ç°t³Æ¥H¥~¤§TrendMicroÁͶխì¼t°t¥ó


¡@

¡@

¡@


TrendMicroÁͶÕ
TrendMicroÁÍ¶Õ Web Security - ServerBank¸ê°T±ÄÁʺô
TrendMicroÁÍ¶Õ Web Security
¨¾¬r¦w¥þ³nÅé


¡@
²£«~³W®æ
·s¼Wºô­¶1

TrendMicroÁÍ¶Õ Web Security

KEY BENEFITS
• Delivers Superior Protection ¡X Any Device, Anywhere: Trend Micro Web Security stops threats directly in the cloud
before they get to your endpoints. Your users will be protected across any device¡Xincluding desktop and mobile
platforms¡Xat any location, whether on the corporate network or not. It delivers comprehensive real-time protection
against the full scope of web threats by using anti-malware, web reputation, and the strongest advanced threat
protection that includes sandboxing and predictive machine learning. Leveraging the real-time protection provided
by our global Trend Micro™ Smart Protection Network™, this solution even has the capacity to defend against new
emerging threats.
• Cloud Application Access Control: Trend Micro Web Security has the ability to identify more than 30,000 cloud
services in use and executes the granular access policy set up by admin. This powerful capability allows you to
configure access control on unsanctioned cloud apps for different users or user groups within a defined schedule,
boosting your organization¡¦s security and productivity.
To make Trend Micro Web Security even more powerful, cloud service filters block personal account access to
sanctioned apps. For example, employees can only use their corporate account to log on to Dropbox™, but are
prohibited from signing in via their personal account, preventing sensitive data from leaking.
• Flexible Deployment Options to Fit Your Needs: This unique deployment model allows you to choose how you
deploy the product, allowing our customers to choose between on-premises, cloud, or both. Cloud-based deployment
for all users, including on-site, branch offices, and remote/mobile users, eliminates the expense and resource
drain associated with backhauling traffic or managing multiple separate on-premises secure web gateways. Hybrid
deployment allows you to deploy the on-premises virtual appliances for large corporate sites while using cloud
web gateway to secure the activity of your smaller branch offices and mobile users. In addition, pure on-premises
deployment can be adopted for on-site users who prefer it.
• Single, Centralized Management Console: One cloud-based management console allows you to manage and
monitor web use in real time. This single pane of glass lets you to manage centralized and unified policies across both
on-premises and cloud-based deployment instances. Interactive and customizable dashboards and reports give you
complete visibility of web usage and security information.

KEY FEATURES
Gateway Anti-Malware and HTTPS Decryption
• Prevents malware from entering your network, relieving the burden on endpoint security.
• Stops virus and spyware downloads, botnets, malware callback attempts, and malware tunneling.
• Closes the HTTPS security loophole by decrypting and inspecting encrypted content.
Web Reputation with Correlated Threat Data
• Trend Micro Smart Protection Network web reputation technology blocks access to websites containing malicious activity.
• Protects against new threats and suspicious activity in real time.
• Identifies and blocks botnet and targeted attack command and control (C&C) communications using global and local threat intelligence.
URL Filtering and Categorization
• Uses real-time URL categorization and reputation to identity inappropriate or malicious sites.
• Stops drive-by downloads and blocks access to spyware and phishing-related websites.
Application Visibility and Control
• Monitors and reports on more than 30,000 cloud applications and 1,000 internet protocols and applications, including instant messaging, peerto-peer, social networking applications, and streaming media.
• Enables granular policy creation to control all web activity.
• User or user groups, gateways, and schedule-based policy enforcement.
Cloud Sandboxing and Predictive Machine Learning
• Cloud sandboxing provides automatic in-depth simulation and analysis of potentially malicious attachments, including executables and
common office documents, in a secure Trend Micro-hosted sandbox environment.
• Predictive machine learning uses mathematical algorithms to act as an extra layer of scanning to filter unknown files before sending the
suspicious files to the cloud sandbox. It increases efficiency and reduces false positives of cloud sandboxing.
Cloud DLP (Data Loss Prevention)
• Uses more than 240 global data loss prevention templates to safeguard digital assets against accidental or deliberate leakage.
• Integrated with Trend Micro Web Security and hosted by Trend Micro, the cloud DLP can be managed in the unified management console.


¡D¥»¤å¥óªº¸ê°T­Y¦³­×§ï¡A®¤¤£¥t¦æ³qª¾¡C
¡D³W®æ©Î³ø»ù­Y¦³»~¡A¥H­ì¼t«¬¿ý©Î¥¿¦¡³ø»ù³æ¬°¥D¡C
¡D¥»ºô¯¸¤º®e©Î¤å¥ó·í¤¤©Ò´£¤Î¤§«~µP¤Î²£«~¦WºÙ©Î¹Ï¤ù§¡¬°¨ä­ì©ÒÄݤ½¥q¤§ª©Åv¡B°Ó¼Ð©Îµù¥U°Ó¼Ð¡C

º¡¤@©w¼Æ¶q©Îª÷ÃBÁÙ¦³¦h´ÚÃØ«~¥i¨Ñ¿ï¾Ü³á! ServerBank ¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºTrendMicroÁÍ¶Õ - TrendMicroÁÍ¶Õ Web Security±ÄÁÊ¿ï¾Ü´N¦b ServerBank!


¥æ©ö¤Î¹B°e«O©T»¡©ú
¥æ©ö¤è¦¡¡G
±z¤£½T©w¥H¤W°Ó«~¬O§_²Å¦X±zªº»Ý¨D?¨SÃö«Y¡A§Ú­Ì·|¬°±z¦V­ì¼t½T»{¡C©Î¬O±z§Æ±æ¼W´î¥H¤W°Ó«~¤§³W®æ¹s²Õ¥ó¡A§Ú­Ì³£¥i¼u©Ê°t¦X±zªº»Ý­n³ø»ù¤Î¥X³f¡C ¦p±z¹ï¥H¤W²£«~³W®æ¥H¤Î»ù®æº¡·N¡A¥i³z¹L¥H¤U¤è¦¡¶i¦æ±ÄÁÊ¡G

1.¹q¸ÜÁpô¡G ½Ðª½±µ¨Ó¹q¡G(02)8969-0901
2.ºô¸ô¸ß»ù¡GÂI¿ï¥»­¶ÁʶR¸ß»ù§Ú­Ì·|¥ß§Y»P±zÁpô!
3.¨Ó¨ç¸ß»ùEmail: service@serverbank.com.tw
¥I´Ú¤è¦¡¡G¦p«È¤á¬°­º¦¸¥æ©ö±Ä²{ª÷¥æ©ö¡C
¶Ç¯u­q³æ¡G ª½±µ±N¥¿¦¡³ø»ù³æñ¦W«á¶Ç¯u¦Ü(02)2253-9016 §Y§¹¦¨­qÁʵ{§Ç¡A§Ú­Ì·|©ó³Ìµu®É¶¡¤º¹q¸Ü½T»{­q³æ¡C
±H°e®É¶¡¡G¨Ì³y¤£¦P¼tµP¥N²z°Ó¦³©Ò¤£¦P¡A¤j¦h¼Æ°Ó«~©ó 7 ­Ó¤u§@¤Ñ¯à°e©è«È¤áºÝ¡A§Ú­Ì¦¬¨ì±z­q³æ®É·|¦P®É¦^Âбz½T©w¥æ´Á¡C
°e³f¤è¦¡¡G(1) ­ì¼t©Î¬O¥N²z°Óª½±µ°t°e (2) ¥ÑServerBank©e°U¦v°t©Î¬O³f¹B¤½¥q°e¹F¡C
°e³f½d³ò¡G­­¥xÆW¥»®q¦a°Ï¡A¹B¶O¥Ñ ServerBank ¬°±z­t¾á¡Aª`·N¡I¦¬¥ó¦a§}½Ð¤Å¬°¶l¬F«H½c¡C
°â«áªA°È¡G­Y²£«~¥»¨­·å²«©Î¹B°e¹Lµ{¾É­P·s«~·å²«¡A¨ì³f7¤é¤º¥i§ó´«·s«~¡C
«O©T¬Fµ¦¡G ¹ê»Ú¥H­ì¼t¤Î¥N²z°Ó¤½§i«O©T±ø¥ó¬°¥D¡A¬d¾\Áʪ«»¡©ú»P«O©TªA°È¡C

¤O±ô¸ê°T ServerBank Inc. ²¤¶

¥Ø«e¤w¸g¬°¶W¹L30000®a¥ø·~´£¨ÑIT¸ê°T¬[ºc©Ò»Ýªº³nµwÅé³]³Æ¡A¦U¦æ·~ª¾¦W«È¤á¦p¡G

»s³y·~¡G¥x¿n¹q¡B¤Í¹F¡BÂE®üºë±K¡B¤O´¹¥b¾ÉÅé¡B¦w±¶­Û¡B¥xÆWªFªÛ¡B¥xÆW­^­¸­â¡B¥¿´Q¡B§¡»¨¡B§»¥¿¡B©MºÓÁp¦X¡BªF¶©¡B«Ø¿³¹q¤l¡B­¸§Q®ú©úùÖ¡B®õª÷Ä_¡B¯«³q¡B¯«¹F¡B°¶³Ð¤O¡B±d¥þ¡B°ê²³¡B±á¬P¥b¾ÉÅé¡B¼s¹F¹q¸£¡B¼s¿o¹q³q¡BÁpµØ®ðÅé¡BÄ_¦¨¤u·~¡B¼s¹B¡B

¥~°Ó¡G ¥xÆWNTT¡B¥xÆW·Nªk¥b¾ÉÅé¡B¥xÆWNEW Balance¡B¥xÆWNEC¡B¥xÆWSONY¡B¥xÆW´I¤h¥þ¸S¡B

ª÷¿Ä¡G°ê®õ¤H¹Ø¡B¤¸¤jÃÒ¨é¡B«n¤s¤H¹Ø¡B°ê®õ¥@µØ¡B¥xÆW¤u·~»È¦æ¡B¥xÆWª÷¿Ä¬ã°V°|¡B¤T°Ó¬ü¨¹¤H¹Ø¡B¤j¸Û«OÀI¡Bªk°ê¤Ú¾¤¤H¹Ø¡B«O¸Û¤H¹Ø¡B°êµØ¤H¹Ø¡B²Î¤@ÃÒ¨é¡B´I¨¹¤H¹Ø¡BµØ«n²£ª««OÀI¡B·s¥ú¤H¹Ø¡B¥xÆW²£·~«OÀI¡B

¬y³q¡G ·s¥ú¤T¶V¡B¤T¹´(·L­·¼s³õ)¡B«H¸q©Ð«Î¡Bªü¨½¤Ú¤Ú¡B

Æ[¥ú¡G ¤¤«H¶º©±¡B¶³®Ô¶º©±¡B¤Ó¥­¬v¡BµØ®õ¡B¤»ºÖ¡B¤Ñ²»´¹µØ¡B¬K¤Ñ°s©±¡B»·¶¯®ü¬v¤½¶é¡B

­¹«~¡G ¥xÆWµÒ°s¡B¤Ñ¤¯¯ù¸­¡B¤¸¯ª¡B¥ú¬u¡B·sªF¶§¡B¦w¤ß­¹«~(¼¯´µº~³ù)¡B®õ¤s¡B®üÅQ¤ý¡B²Î¤@¥ø·~¡B¾ó¤ì±í¡B¯ø´µ¸ª¡B«¢¸ò¹F´µ¦B²N²O¡B

´CÅé¡G ³ü¶Ç´C¡BÁp¦X³ø¡B¥xµø¡BµØµø¡B«D¤Z¹qµø¡B¨È¬w¼s¼½¡B­¸ºÐ¼s¼½¡B­·¼é°Û¤ù¡B®É³ø©P¥Z¡B

±Ð¨|¡G ¥xÆW¤j¾Ç¡B¥æ³q¤j¾Ç¡B²MµØ¤j¾Ç¡B¤j¦P¤j¾Ç¡B¤¤¥¡¤j¾Ç¡B¤¤­ì¤j¾Ç¡B¤¤¿³¤j¾Ç¡B»²¤j¡B°ê»y¹ê¤p¡BÂù¶é°ê¤p¡BµØ¿³¤¤¾Ç¡BªFªù°ê¤p¡B¥x¬ì¤j¡B©ú§Ó¡BªF§d¡BªF®ü¹qºâ¤¤¤ß¡Bªø©°¤j¾Ç¡B«n¨È§Þ³N¾Ç°|¡B¨ÈªF¡B«nªù°ê¤¤¡B¥x®v¤j¡BªFµØ¡B¶§©ú¡B¶³¬ì¤j¡B¦Ë®v¡Bº[«n¤j¾Ç¡B±X¤s¬ì¤j¡B²H¦¿¡B²M¶³¡B³{¥Ò¡B

²Õ´¡G «H«O°òª÷¡B«C³Ð·|¡B¤¤¤p¥ø·~¨ó·|¡BºÞ²z¬ì¾Ç¾Ç·|¡B­ì¦í¥Á±Ú¤å¤Æ±Ð¨|¨ó·|¡B¸êµ¦·|¡B¥xºô¤¤¤ß¡B¶³ªù»R¶°

¬F©²¡G ¤¤¬ã°|¡B¤¤¬ì°|¡B°·«O§½¡B¤Ñ¤å¬ì±ÐÀ]¡B¦Á¤îĵ§½¡BªO¾ô¹A·|¡B¥x¥_¿¤®ø¨¾§½¡B°ê½Ã°|¡B®ü¥ÍÀ]¡B°ê¦w§½¡B

ÂåÀø¡G ¥x¤jÂå°|¡B®¦¥D¤½Âå°|¡B¥_¨Ê¦P¤¯°ó¡B®H¨½°ò·þ±ÐÂå°|¡B¸¯Äõ¯À¥v§J¡Bù¤ó¤jÃļt¡B¥Ã«HÃÄ«~¡B

¹q«H¡G ¤j²³¹q«H¡B¥xÆW©Tºô¡B»·¶Ç¹q«H¡B

¥æ³q¡G ¥x¥_±¶¹B¤½¥q¡BµØ¯è¡B¤­±]±¶¹B¡B¥xÆW´¼¼z¥d¡B

¤½¯q¡G³ßéw¨à¡B¥ì¨l¡B¶§¥ú°òª÷·|¡B»Z¤½­^¡B¿ßÀYÆN

©v±Ð¡G ¤¤¥xÁI¦x¡B°ò·þ±Ð¦æ¹D·|¡B°ò·þ±Ð®û«H·|¡B

­x¤è¡G ªÅ­x¥q¥O³¡¡B°ê¨¾Âå¾Ç°|¡B


¡@
¡@

ServerBank¥Ñ¤O±ô¸ê°TªÑ¥÷¦³­­¤½¥q«Ø¸m service@serverbank.com.tw
¹q¸Ü(02)8969-0901 ¶Ç¯u(02)2253-9016 ·s¥_¥«ªO¾ô°Ï¤å¤Æ¸ô¤@¬q268¸¹3¼Ó

¡@
¡@