


{"id":210,"date":"2020-02-18T05:36:17","date_gmt":"2020-02-18T05:36:17","guid":{"rendered":"https:\/\/the7.io\/consulting\/?p=210"},"modified":"2023-03-10T05:44:48","modified_gmt":"2023-03-10T05:44:48","slug":"introducing-qbic-fortify","status":"publish","type":"post","link":"https:\/\/www.qbictechnology.com\/zh-tw\/news\/introducing-qbic-fortify\/","title":{"rendered":"Introducing Qbic Fortify"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"210\" class=\"elementor elementor-210\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-5572443 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5572443\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ee85d1\" data-id=\"0ee85d1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9222d0 elementor-widget elementor-widget-heading\" data-id=\"d9222d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Best Fortification For IPC &amp; IoT Devices<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14087d8 elementor-widget elementor-widget-spacer\" data-id=\"14087d8\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90e702b elementor-widget elementor-widget-text-editor\" data-id=\"90e702b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a leader in industrial PC design, Qbic&#8217;s primary goal is to help our partners build the most reliable and safe products. After years of research and development in the security scope, we are excited to announce the Qbic Fortify+, which provides our partners with easy integration of Qbic customized security features into products and services for secure-critical projects.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-48d8171 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48d8171\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52b50fa\" data-id=\"52b50fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a0c650 elementor-widget elementor-widget-heading\" data-id=\"9a0c650\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Security Trinity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d549fe elementor-widget elementor-widget-spacer\" data-id=\"3d549fe\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd4c91 elementor-widget elementor-widget-text-editor\" data-id=\"2dd4c91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In device security, device access, data usage, and operating environment are interactive, and the protection of those three aspects is indispensable. Qbic deploys nine major fortifications for partners to prevent devices from security threats<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76e2dc4 elementor-widget elementor-widget-spacer\" data-id=\"76e2dc4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7640e6 elementor-widget elementor-widget-image\" data-id=\"c7640e6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"703\" src=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Security-Trinity-1024x703.png\" class=\"attachment-large size-large wp-image-10519\" alt=\"Security Trinity\" srcset=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Security-Trinity-1024x703.png 1024w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Security-Trinity-300x206.png 300w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Security-Trinity-768x527.png 768w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Security-Trinity.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-03c7556 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c7556\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1db7f16\" data-id=\"1db7f16\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-266f7a7 elementor-widget elementor-widget-heading\" data-id=\"266f7a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Access Protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7123e elementor-widget elementor-widget-spacer\" data-id=\"ce7123e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d59c447 elementor-widget elementor-widget-text-editor\" data-id=\"d59c447\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The first step in most attacks is obtaining access rights, whether remote access or physical access. Qbic Fortify+ allows MIS\/IT to define physical and remote access with constraints in advance to fit different user scenarios. Furthermore, encrypted connection is required, especially in remote access. Besides the access via network and I\/O ports, the protection for the login process is ignored easily. An authentication mechanism for the device administrator can be pre-set up in the production process. Therefore, security during device delivery is not compromised. After passing all enhanced security passes, the device will deliver the access rights finally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6349f41 elementor-widget elementor-widget-spacer\" data-id=\"6349f41\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-605e6af elementor-widget elementor-widget-image\" data-id=\"605e6af\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"207\" src=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Access-Protection-1024x207.jpeg\" class=\"attachment-large size-large wp-image-10521\" alt=\"Fortify Access Protection\" srcset=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Access-Protection-1024x207.jpeg 1024w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Access-Protection-300x61.jpeg 300w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Access-Protection-768x156.jpeg 768w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Access-Protection.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8b4ce6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b4ce6c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1294082\" data-id=\"1294082\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52e7239 elementor-widget elementor-widget-heading\" data-id=\"52e7239\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcaa9f7 elementor-widget elementor-widget-spacer\" data-id=\"fcaa9f7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddf450e elementor-widget elementor-widget-text-editor\" data-id=\"ddf450e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nowadays, information protection has become an essential requirement, especially in the IoT environment. Hackers can steal or misuse information through local or remote access. Though access protection of Qbic Fortify+ provides the first layer protection, Qbic still deploys the second layer protection: data protection to ensure information security. Encrypting data and limiting access are the most popular methods to provide information security. But these only satisfy general usage. For example, within the control center of an automated factory or government institutions like the Department of Defense, sensitive data such as image\/video, voice, and environment status are supposed to be protected well. Therefore, cameras, mic, GPS, and kinds of sensors should be accessed restricted.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa5591e elementor-widget elementor-widget-spacer\" data-id=\"aa5591e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8df77b5 elementor-widget elementor-widget-image\" data-id=\"8df77b5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"207\" src=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Data-Protection-1024x207.jpeg\" class=\"attachment-large size-large wp-image-10523\" alt=\"\" srcset=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Data-Protection-1024x207.jpeg 1024w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Data-Protection-300x61.jpeg 300w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Data-Protection-768x156.jpeg 768w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Data-Protection.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-0358c51 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0358c51\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6d8270\" data-id=\"d6d8270\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf76e8d elementor-widget elementor-widget-heading\" data-id=\"bf76e8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Environment Protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94ac9bf elementor-widget elementor-widget-spacer\" data-id=\"94ac9bf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-683d8c8 elementor-widget elementor-widget-text-editor\" data-id=\"683d8c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the environment protection of Qbic Fortify+, firmware is the first target to be protected. Due to the system update being enabled in most situations, replacing the whole system becomes a practical attack method. But don&#8217;t worry; Qbic Fortify+ deploys three checkpoints to defend against this attack. First, the attacker needs to pass the access protection. Second, even the hacker gets the access right and then injects the malware files into a device, those files need to be certified before the upgrade process. Finally, the boot loader plays the goalkeeper. The device will not start successfully if the updated system is not approved. Besides the firmware replacement attack, APPs and configuration are required to be safeguarded. Qbic&#8217;s customized firmware provides environment pre-build, such as APPs pre-install and Wi-Fi access pre-setting. Thus, limiting related changes can maximize the system&#8217;s robustness. Finally, security patches will be provided regularly for devices to reduce the probability of being attacked. Of course, the patch files are transferred via a secure tunnel, just like the firmware upgrade. Thus, the entire operating environment is protected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dd45e2 elementor-widget elementor-widget-spacer\" data-id=\"8dd45e2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1169d9d elementor-widget elementor-widget-image\" data-id=\"1169d9d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"239\" src=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Environment-Protection-1024x239.jpeg\" class=\"attachment-large size-large wp-image-10525\" alt=\"Qbic Fortify Environment Protection\" srcset=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Environment-Protection-1024x239.jpeg 1024w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Environment-Protection-300x70.jpeg 300w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Environment-Protection-768x179.jpeg 768w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify-Environment-Protection.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-40d4852 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40d4852\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddb6c6a\" data-id=\"ddb6c6a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7e640d elementor-widget elementor-widget-heading\" data-id=\"f7e640d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Pursuit of Security Never Ends<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3762d23 elementor-widget elementor-widget-spacer\" data-id=\"3762d23\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7a4c5 elementor-widget elementor-widget-text-editor\" data-id=\"ed7a4c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the future, new hardware and software vulnerabilities will be discovered continuously. Therefore, the Qbic Fortify+ is just a milestone, not the final destination of Qbic Technology in security scope. Qbic&#8217;s primary goal is to help its partners build the most reliable and safe products and services. And, we never stop.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.<\/p>\n","protected":false},"author":2,"featured_media":10515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing Qbic Fortify - Qbic Technology<\/title>\n<meta name=\"description\" content=\"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing Qbic Fortify - Qbic Technology\" \/>\n<meta property=\"og:description\" content=\"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\" \/>\n<meta property=\"og:site_name\" content=\"Qbic Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/QbicTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-18T05:36:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T05:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"449\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Qbic Technology\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\"},\"author\":{\"name\":\"Qbic Technology\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/56b832abd73faa0295280297361403aa\"},\"headline\":\"Introducing Qbic Fortify\",\"datePublished\":\"2020-02-18T05:36:17+00:00\",\"dateModified\":\"2023-03-10T05:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"tw\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\",\"url\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\",\"name\":\"Introducing Qbic Fortify - Qbic Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png\",\"datePublished\":\"2020-02-18T05:36:17+00:00\",\"dateModified\":\"2023-03-10T05:44:48+00:00\",\"description\":\"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#breadcrumb\"},\"inLanguage\":\"tw\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage\",\"url\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png\",\"contentUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png\",\"width\":1200,\"height\":449,\"caption\":\"Qbic Fortify+ Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.qbictechnology.com\/zh-tw\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing Qbic Fortify\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.qbictechnology.com\/#website\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"name\":\"Qbic Technology\",\"description\":\"Your Smarter Space\",\"publisher\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.qbictechnology.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tw\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\",\"name\":\"Qbic Technology Co., Ltd.\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"contentUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"width\":1347,\"height\":566,\"caption\":\"Qbic Technology Co., Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/QbicTechnology\",\"https:\/\/www.linkedin.com\/company\/qbictechnology\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/56b832abd73faa0295280297361403aa\",\"name\":\"Qbic Technology\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/472dc0223c7e35488641423fc2c031970de676c6f90ff156604c1891fa7c918b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/472dc0223c7e35488641423fc2c031970de676c6f90ff156604c1891fa7c918b?s=96&d=mm&r=g\",\"caption\":\"Qbic Technology\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing Qbic Fortify - Qbic Technology","description":"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/","og_locale":"en_US","og_type":"article","og_title":"Introducing Qbic Fortify - Qbic Technology","og_description":"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.","og_url":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/","og_site_name":"Qbic Technology","article_publisher":"https:\/\/www.facebook.com\/QbicTechnology","article_published_time":"2020-02-18T05:36:17+00:00","article_modified_time":"2023-03-10T05:44:48+00:00","og_image":[{"width":1200,"height":449,"url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png","type":"image\/png"}],"author":"Qbic Technology","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#article","isPartOf":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/"},"author":{"name":"Qbic Technology","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/56b832abd73faa0295280297361403aa"},"headline":"Introducing Qbic Fortify","datePublished":"2020-02-18T05:36:17+00:00","dateModified":"2023-03-10T05:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/"},"wordCount":566,"publisher":{"@id":"https:\/\/www.qbictechnology.com\/#organization"},"image":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage"},"thumbnailUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png","articleSection":["News"],"inLanguage":"tw"},{"@type":"WebPage","@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/","url":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/","name":"Introducing Qbic Fortify - Qbic Technology","isPartOf":{"@id":"https:\/\/www.qbictechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage"},"image":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage"},"thumbnailUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png","datePublished":"2020-02-18T05:36:17+00:00","dateModified":"2023-03-10T05:44:48+00:00","description":"Announcing Qbic Fortify+, which provides easy integration of customized security features into products for secure-critical projects.","breadcrumb":{"@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#breadcrumb"},"inLanguage":"tw","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/"]}]},{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#primaryimage","url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png","contentUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2020\/02\/Qbic-Fortify.png","width":1200,"height":449,"caption":"Qbic Fortify+ Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.qbictechnology.com\/zh-tw\/"},{"@type":"ListItem","position":2,"name":"Introducing Qbic Fortify"}]},{"@type":"WebSite","@id":"https:\/\/www.qbictechnology.com\/#website","url":"https:\/\/www.qbictechnology.com\/","name":"Qbic Technology","description":"Your Smarter Space","publisher":{"@id":"https:\/\/www.qbictechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.qbictechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tw"},{"@type":"Organization","@id":"https:\/\/www.qbictechnology.com\/#organization","name":"Qbic Technology Co., Ltd.","url":"https:\/\/www.qbictechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","contentUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","width":1347,"height":566,"caption":"Qbic Technology Co., Ltd."},"image":{"@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/QbicTechnology","https:\/\/www.linkedin.com\/company\/qbictechnology\/"]},{"@type":"Person","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/56b832abd73faa0295280297361403aa","name":"Qbic Technology","image":{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/472dc0223c7e35488641423fc2c031970de676c6f90ff156604c1891fa7c918b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/472dc0223c7e35488641423fc2c031970de676c6f90ff156604c1891fa7c918b?s=96&d=mm&r=g","caption":"Qbic Technology"}}]}},"_links":{"self":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":0,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/media\/10515"}],"wp:attachment":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}