Skip to content

CyberLink’s CEO Jau Huang To Present at NVIDIA GTC 2022

TAIPEI, TAIWAN — March 16, 2022 — CyberLink Corp. (5203.TW), a pioneer in multimedia and AI technologies, announced today Dr. Jau Haung, its founder and CEO, has been invited to speak at NVIDIA’s GPU Technology Conference 2022 (GTC). Dr. Huang will address the role of AI in helping content creators enhance productivity and improve quality when making engaging, professional videos. The presentation will take place virtually on Thursday, March 24 at 11 a.m. CST (Wednesday, March 23 at 11 p.m. ET/8 p.m. PT).

GTC is a global AI conference held every half year, bringing together hundreds of developers who share the latest trends and applications for AI, computer graphics, data science, and machine learning.

At GTC 2022, Dr. Huang will share how CyberLink utilizes AI-powered tools in PowerDirector, its flagship video editing software, for features such as AI style transfer, sky replacement, motion tracking, and a series of enhancer tools. CyberLink first introduced its video editing software in 2001 and closely followed rising trends for more than two decades – from SD and HD to VR and 4K, from optical discs and files to online and streaming media – before deploying AI for editing in 2020.

“Artificial intelligence changes every aspect of life, from industrial-level image recognition to video analytics, security, autonomous vehicles and digital content creation,” said Dr. Jau Huang, CEO of CyberLink. “As the world-leading AI and multimedia software developer, we use AI extensively in our FaceMe® facial recognition solution as well as our creative software and apps, such as PowerDirector. It is CyberLink’s mission to help video creators at all levels achieve image and audio superiority, allowing them to create something extraordinary no matter their skill level.”

In the past, the use of motion tracking or motion masks was a labor-intensive and time-consuming undertaking reserved to professional creators. With the help of AI technology, PowerDirector delivers fast, accurate motion tracking – with just a few clicks, making this powerful tool accessible to every creator and for all creations, ultimately raising standards across all video productions.

In the same vein, AI brings some of the most sophisticated special effects to novice creators while cutting down dramatically the time spent by industry professionals. For example, PowerDirector’s sky replacement feature uses AI to precisely segment the sky in a video sequence and replace it with footage of sky conditions that better match the desired effect or visual aesthetics. This feature has the power to transform the atmosphere of a scene in a few clicks. From a practical aspect, it enables outdoor filming in a much wider range of sky conditions, eliminating costly interruption from changing weather or simply waiting for the right time between sunrise and sunset.

To learn more about PowerDirector, visit CyberLink online at http://www.cyberlink.com, or sign-up for CyberLink’s track at GTC 2022.

CyberLink @ GTC 2022 Information

  • Topic: AI-powered Video Editing for Creators at All Levels [S41616]
  • Speaker: Dr. Jau Huang, Founder and CEO of CyberLink
  • Time:
    • Thursday, March 24 11:00AM – 11:25AM (CST, Taiwan)
    • Wednesday, March 23 11:00PM – 11:25PM (EDT, New York)
    • Wednesday, March 23 8:00PM – 8:25PM (PDT, Los Angeles)
  • GTC 2022 Official Website: https://www.nvidia.com/gtc
  • Sing up for CyberLink Track

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

The Best Ways to Secure Device Onboarding in The Enterprise

With the prevalence of digital transformation in the enterprise, there is a clear necessity to balance IoT security issues and BYOD security measures that will prevent suspicious or malicious devices from gaining access to the enterprise’s assets and data centers, while at the same time, making sure that productivity and easy onboarding of devices is maintained. Employees, guests and contractors are bringing all kinds of Wi Fi enabled devices to the enterprise environment and they expect easy and quick network connectivity.

Onboarding is the process in which new devices gain access to the enterprise for the first time. Unfortunately IT departments can sometimes experience additional workloads while endeavoring to get all the devices on the network so as not to hinder business productivity. At the same time, if they are not handling the process with top security standards in mind, they could potentially place users, devices, enterprise data and the network itself at risk. The question arises: how should IT Security teams allow for BYOD, IoT, contractors, guests, etc. to securely and quickly connect to the network without placing any of its components at risk of a breach or ransomware attack? The answer: automation.

By automating the entire onboarding process enterprises can achieve the following benefits:

  • Reducing the costs that are typically associated with manual work (including configuration and support activities).
  • Enhancing productivity – getting team members, contractors and guests connected to work faster.
  • Increasing end-user satisfaction – instead of hassling end-users with onboarding procedures, the whole process can and should be seamless.
  • Decreasing the risks – unmanaged, unpatched, high-risk devices should be blocked or connected from the beginning to a separate segment of the network from where the key corporate assets are stored (the “crown jewels” of the company).

Easy Device Onboarding

Employees, students, contractors, partners and guests should onboard their devices once and then automatically re-authenticate after that, within an environment that continuously monitors all devices on the networks and automatically provides a risk score for every device. This ongoing scoring allows security teams to understand the security posture of the devices and the network as a whole, at any given moment. At the same time, there is no need to have end users repeatedly re-enter credentials on subsequent network connections unless a device is deemed to have a high risk-score. This way the enterprise can easily onboard BYOD devices belonging to employees that are traveling, working remotely or working at a satellite office location. Additionally, this allows onboarding of IoT and smart devices for business such as flat screens, printers and IoT devices, as well as gaming consoles, smart refrigerators and more. These items, of course, must be on a separate segment from where company assets are kept.

Reducing Risks on the Network

A while ago Ofer Amitai, Portnox CEO, wrote about tips for securing endpoint devices on college campuses, institutions that are always desiring a relatively simple onboarding process. He discussed how changes in onboarding and guest access policies could reduce risks and improve network visibility and control. The principals for securing the enterprise require these steps and more. Having a clear onboarding set of policies will allow IT teams to have automated actions applied (see examples in the next section).

After handling the company’s initial network security audit and collecting the security posture of all devices, it is important to make sure that the enterprise authorization policies include conducting automated and continuous security assessments of the network.  This way, every device employs baseline security measures before being allowed to connect.  Additionally, the IT security team should use granular policies to govern the level of access while maintaining full visibility and control over network connected devices with the ability to revoke access at any time.

Automated Device Onboarding & Network Authentication

Having an automated onboarding set of policies can allow for automated actions such as:

  • Immediately allowing Internet access
  • Blocking/ disconnecting
  • Segmenting a device to a separate network section
  • Remediation actions

For example, IoT devices are considered to be easy to hack.  Therefore, once connected to the enterprise network, these devices should be separated from where core assets are located.  Having different segments on the enterprise network is a good solution for that.  Additionally, if a visitor is being connected, the visitor should gain access to the Internet and not to company files, even when plugging the computer to the wired network.

Two important advanced guest network onboarding features are recommended to be included:

  • Easy guest access – allowing for simple and fast connections together with the ability to continuously monitor all devices and ensure security.
  • Agentless access – once the IT administrators have set up the onboarding policy – contractors and guests on protected networks should be able to self-onboard without installing an endpoint agent.

Acquiring Advanced Onboarding Capabilities

One of the technologies that can help with safe onboarding is network access control (NAC).  In the past, companies used only desktops and laptops, connected and authenticated over a wired network, however; nowadays wireless networks and mobile technologies have introduced personal devices (via BYOD policies) and Internet of Things (IoT) to the workplace.  In addition, increasingly stringent compliance standards, such as PCI-DSS, SOX, and ISO standards require companies to openly communicate their security controls to external auditing authorities.  All of these can be achieved via NAC solutions. Network access security should be a priority for all companies moving forward.

Every enterprise today must support a rapidly proliferating world of devices and platforms.  From an operational view point, this shouldn’t pose an obstruction of workflows and productivity. Ideally, the enterprise IT team will automate and secure network onboarding and authentication so that the IT helpdesk doesn’t have to intervene when guests, contractors and IoT devices need to connect. Additionally, an effective plan for secure network onboarding will on one hand improve end-user experience for BYOD, IoT, users and guests and on the other hand improve IT security as part of a layered protection strategy.

Looking to set IT security policies and automate your device onboarding? Portnox CLEAR offers easy onboarding while never compromising on network security across the enterprise.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

訊連科技FaceMe®前進2022台北智慧城市展  展出智慧安控、智慧物聯網與智慧金融等多種AI解決方案

【2022年2月9日,台北訊】 AI人工智慧領導廠商訊連科技(5203.TW)宣布將於 2022 年 2 月 23 日舉行「2022 智慧安控新機遇」研討會。會中將介紹FaceMe® Security 7新版本的多人動態式人臉辨識解決方案,提供門禁考勤及口罩偵測、體溫測量等防疫功能,可適用於智慧辦公室、智慧工廠及智慧建築等多樣場景,也推出全新「以圖找圖」的智慧人臉搜尋功能。此外,並邀請 Intel® 、Network Optix及晶睿通訊等產業專家,分享最新人工智慧於邊緣裝置的應用,及安控產業的最新趨勢。

疫情當前,員工上班量體溫、配戴口罩已是每日例行公事,然需使用額溫槍量測及使用刷卡方式打卡,不僅造成不必要之人力、時間成本,亦有潛在的接觸風險。訊連科技推出 FaceMe® Security 動態式人臉辨識軟體,方便員工以「刷臉」方式,無須刻意站在鏡頭前,自然行走即能完成人臉辨識,在 1 秒內同時完成出勤打卡、口罩偵測、體溫測量等後疫情世代必備工作,為企業實現「零接觸」門禁暨員工健康管理。

FaceMe® Security可相容於現行各式 IP 攝影機、邊緣裝置、工作站與伺服器,無須全面升級安控設備,僅需額外安裝軟體及搭配部分具有人臉辨識能力之電腦或工作站,以低於20%之成本,即可為企業無縫升級刷臉門禁、防疫等多樣應用。

訊連科技也與晶睿通訊、Network Optix 等安控廠商合作,將 FaceMe® Security 解決方案整合至主流VMS影像管理系統。當偵測到特定人士或事件發生時,便會即時發送告警,輔助保全迅速應對。

而為加強物聯網設備的 AI 運算能力,FaceMe® 亦針對多項 Intel® 物聯網服務進行優化,以提升企業在 Intel® 平台導入 AI 人臉辨識的運算效能與彈性。訊連科技為Intel® 物聯網解決方案聯盟成員,透過與 Intel® 深化合作,訊連科技將加速布局智慧安控與 AIoT 領域的落地應用。

「2022 智慧安控新機遇」研討會活動訊息

  • 時間:2022 年 2 月 23 日 13:30 – 16:30
  • 地點:華南銀行國際會議中心 201 會議廳(台北市信義區松仁路 123 號 2 樓)
  • 活動亦同時透過線上直播進行
  • 活動連結:https://mailchi.mp/cyberlink/solutions_day_2022

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×