Select Page

Welcome to Jiangxia

Language ▼

English

中文

Jiangxia Technology

We are an IT company based in Singapore who resides at the forefront of breakthrough technology.
Equipped with a passionate and talented team, we aim to build innovative applications that are the firsts within the industry.
Currently, our team is working on a web3 project with a pre-registered user base of more than 100,000.

Code

DEV

Live broad-cast

Jiangxia Technology

We are an IT company based in Singapore who resides at the forefront of breakthrough technology.

Code

DEV

Live broad-cast

Future Solutions

Right Here, Right Now

Welcome to Jiang Xia Internet Technology, specializing in Instant Messaging and Data Management Application Development. We are a team of like- minded and determined individuals, all sharing a vision for success and love for Instant Messaging and Data Management Technology. We believe that our Best-In-Class Instant Messaging Technology provides our clients with a high capability to streamline structures and provides intelligent connections, scalability, process efficiency, and powerful performance to unleash a whole new sensation in their messaging and data management experience.

We are constantly developing cutting-edge technologies and services in the market, to constantly offer world-class leading scalable solutions for businesses of all sizes. We are able to custom design apps, UI, and features for a better experience for clients.

Future Solutions

Right Here, Right Now

Welcome to Jiang Xia Internet Technology, specializing in Instant Messaging and Data Management Application Development. We are a team of like- minded and determined individuals, all sharing a vision for success and love for Instant Messaging and Data Management Technology. We believe that our Best-In-Class Instant Messaging Technology provides our clients with a high capability to streamline structures and provides intelligent connections, scalability, process efficiency, and powerful performance to unleash a whole new sensation in their messaging and data management experience.

We are constantly developing cutting-edge technologies and services in the market, to constantly offer world-class leading scalable solutions for businesses of all sizes. We are able to custom design apps, UI, and features for a better experience for clients.

Core Values

Our work may be exceptional, but that is not what distinguishes us. Instead, it is our values that makes us different.

These are the four pillars in which we stand by

1. Integrity

2. Respect

3. Responsibility

4. Care

Integrity

We uphold honesty and strive to do the right thing always.

Respect

We work in a wholesome family environment where we treat each other in a friendly & fair manner, with mutual respect for one another. Our leaders command our respect.

Responsibility

We stand accountable and responsible for what we do and say, looking after the welfare of our team and the interests of the company.

Care

Because we care and believe in making this world a better place, we are committed to doing and providing only the best for our customers, colleagues, suppliers, and shareholders.

Core Values

Our work may be exceptional, but that is not what distinguishes us. Instead, it is our values that makes us different.

These are the four pillars in which we stand by

1. Integrity

2. Respect

3. Responsibility

4. Care

Integrity

We uphold honesty and strive to do the right thing always.

Respect

We work in a wholesome family environment where we treat each other in a friendly & fair manner, with mutual respect for one another. Our leaders command our respect

Care

Because we care and believe in making this world a better place, we are committed to doing and providing only the best for our customers, colleagues, suppliers, and shareholders.

Coding

Seamless implementation of code to features.

Digital Experience Made Better

Digital Experience Made Better
Core Teams

HR Team

The HR team ensures that the team is staffed with the right talent through its recruiting and training programs. The team also helps to build a healthy and productive work culture that allows everyone in the company to thrive in their role.

Finance Team

The finance team oversees the budget for the different departments and projects, ensuring that the company posseses a healthy balance sheet that serves as the driver of sustainable long-term growth.

Engineering Team

The engineering team is responsible for powering the development of the product, delivering clean and efficient code that utilises cutting-edge technology to solve real-life problems.

Product Team

The product team ensures that beautiful and quality end-products are delivered. They drive the innovation done within the company, ensuring that customer needs are always answered with world-class solutions.

Core Team

HR Team

The HR team ensures that the team is staffed with the right talent through its recruiting and training programs. The team also helps to build a healthy and productive work culture that allows everyone in the company to thrive in their role.

Finance Team

The finance team oversees the budget for the different departments and projects, ensuring that the company posseses a healthy balance sheet that serves as the driver of sustainable long-term growth.

Engineering Team

The engineering team is responsible for powering the development of the product, delivering clean and efficient code that utilises cutting-edge technology to solve real-life problems.

Product Team

The product team ensures that beautiful and quality end-products are delivered. They drive the innovation done within the company, ensuring that customer needs are always answered with world-class solutions.

Key Members

Tomi Wu – CEO

Intro :

With over 13 years of extensive experience in network security, Tomi has established himself as one of the foremost experts in safeguarding enterprise networks in China. He is recognized as a trailblazer in the Chinese network security industry and has played a pivotal role in advocating for the adoption of the “Elastic Security Network” solution.

Throughout his career, he has taken on a range of diverse roles within the industry, including serving as a Solution Director at Irixun, assuming the role of Director of Network Security at Suning, and serving as an Assistant to the Chief Technology Officer. Additionally, he has held positions as a Product Director and a Senior Expert in Enterprise Security at Alibaba Cloud.

His wealth of experience encompasses a profound understanding of the challenges and solutions within both first-party and third-party security domains. Tomi has been deeply engaged in numerous large-scale enterprise security communication network projects, where he has provided robust security support for intricate IT infrastructures within group-oriented enterprises.

 

Mikko Shen – Product Director

Intro:

With 12 years of expertise in the security industry, his responsibilities have encompassed leading research and development initiatives for vulnerability scanning systems, DDoS protection systems, and internet business risk control systems.  He possess extensive experience across diverse scenarios, conducting research and development in the realms of network security and business security.

Within the domain of data security, Mikko has overseen the architecture and development of the Application API Data Risk Monitoring System. Subsequently, his focus transitioned to pioneering research in data security, centering on industry compliance and risk assessment. His practical acumen extends to a range of sectors, including finance, government, internet, and healthcare.

 

Malick Zheng – QA and Operations Director

Intro:

With over 12 years of experience in both the security and AI industries, Malick has amassed a rich background in conceiving, crafting, and orchestrating projects centered around security and AI solutions. His proficiency extends to adeptly overseeing multiple projects concurrently, while his involvement has been profound in the conceptualization, architecture, and development of diverse systems. These include Web Application Firewalls, Intrusion Detection Systems, Algorithm Annotation Platforms, User Behavior Analysis Platforms, Security Synchronization Platforms, and Asset Vulnerability Management Platforms. His perspective offers distinctive insights into network security protection products as well as internal security solutions tailored for enterprises.

Owen Li – System Architect

Intro:

As an R&D specialist in the field of cybersecurity, Owen had the privilege of working for two pioneering technology giants, Tencent and Alibaba Cloud. Throughout his career, his primary focus has been on the advancement of cutting-edge security solutions, encompassing domains such as firewall technology, intrusion prevention systems (IPS), and safeguarding game clients.

Activities

Our Products & Services

 

 

Enterprise security office Instant Messaging communication software

Creating a safe mobile office

Deliver a user-friendly, secure, and confidential office communication software tailored for both enterprises and employees. Utilize it for seamless online collaboration among enterprise staff, streamline the sharing of critical company documents, and safeguard the organization’s valuable assets against unauthorized access or leaks.

Product - HeyTalk
  • Delivering a user-friendly, secure, and privacy-centric office communication software designed for both enterprises and their employees.  

  • Enables seamless online work for corporate personnel, streamlines the sharing of vital corporate documents, and ensures the protection of critical assets against potential leaks.

  • Moreover, it boasts integration with Web3.0 technologies, including an AI-driven question-and-answer engine and blockchain-based safeguards to prevent tampering of chat content.

Key Features
  1. Instant Messaging: Provides real-time message delivery, supporting text, images, audio, video messages, etc.
  2. Multi-Platform Support: Can be used on multiple platforms such as iOS, Android, Windows, Mac, ensuring seamless connectivity between users.
  3. Security: Utilizes state-of-the-art encryption techniques with end-to-end encryption algorithms to protect user privacy and data security.
  4. Customization: Allows users to customize their profiles, chat backgrounds, emojis, etc., to suit personal preferences.
  5. Group Chat: Supports the creation and management of groups, enabling users to chat with multiple people simultaneously.
  6. Message Sync: Capable of syncing messages across different devices, ensuring users always have the latest chat records.
  7. Artificial Intelligence: Provides an AI-driven question-and-answer engine, facilitating quick information inquiries and problem-solving.
  8. Content Tamper Prevention: Allows users to employ blockchain calculations for chat content, ensuring historical chat records remain unaltered for trusted security.
  9. Office Integration: Features a built-in office app store for integration with enterprise office software, offering services for mobile office tasks such as meeting invitations and reminders, remote attendance, performance assessments, workflow approvals, sensitive document management, and more.
  10. Device Security Check: Allows users to perform network security checks on the mobile and desktop environments where the IM operates, reducing the risk of viruses and Trojan attacks on user devices.
Suitable Scenarios
  1. Enterprise Communication: Provides internal communication tools for businesses, supporting team collaboration and file sharing.
  2. Social Applications: Used for one-on-one and group chats among users, allowing them to share images, videos, and status updates.
  3. Customer Support: Employed for online customer support, enables real-time communication with customers and issue resolution.
  4. Online Communities: Utilized to create and manage online communities, facilitating interaction and discussions among members.
User Benefits
  1. Real-time Communication: Users can instantly connect with family, friends, or colleagues without geographic limitations.
  2. Convenient and Efficient: Multiple communication methods, including text, voice, and video, catering to various communication needs.
  3. Security and Reliability: End-to-end encryption technology ensures the privacy and security of messages.
  4. Highly Customizable: Users can personalize the chat interface to meet their individual preferences.
  5. Mobile Office: Addresses the growing demands for mobile office solutions, offering security, convenience, and reliability.
Target Audiences
  1. Large Enterprises: Offering products and services with private delivery tailored for large corporations.
  2. Small Businesses: Providing SaaS products and services on public cloud for small and medium-sized enterprises (SMEs).
  3. Individual Users: Offering free basic products and services for individual users.
Why you should choose our product?
  1. Outstanding Performance: Our product delivers exceptional performance and stability, ensuring users can always enjoy seamless chatting.
  2. Prioritizing Security: User data security is our top priority, and we employ state-of-the-art security technologies.
  3. User Experience: We focus on user experience, offering an intuitive and user-friendly interface and features.
  4. Customization: Users can customize the application according to their needs and preferences, making it tailored to their individuality.
  5. Continuous Improvement: We continually update and enhance the product to provide the latest features and technologies.
Product Development Status

Still in the development stage, nearing launch: The primary modules of the first phase have been developed and are preparing for integration testing and readiness for launch.

Enterprise Data Management Platform

Make data more secure and create more values

Large amounts of data are accumulated throughout the different departments of the enterprise. In order to increase the value of these data more efficiently and provide better services for the entire enterprise, the enterprise big data open platform will collect, clean, archive, and big data calculation, providing unified access and services to the outside world, so as to make better use of enterprise data to provide services, give full play to the economic value of data, and avoid redundant construction of various departments.

Data Openness
  • Automatic collection and cleaning of different types of data
  • Big Data Intelligent Business Computing Center

  • Provide unified and comprehensive management through the comprehensive dashboard

  • Provide unified opening and access management of public data

Safety Guarantee
  1. Pre (classification and grading of data collection): identification and de-identification storage (encryption or desensitization) of sensitive data
  2. On-the-go (monitoring and risk discovery of sensitive data transfer): monitoring and auditing of sensitive data among internal employees and external open processes;
  3. Post (creating fingerprint watermark identification of sensitive data): After abnormal risks are found during the use of sensitive data, traceability is carried out based on data fingerprints and watermarks

Hello!

Contact Us

+65 6686 6666 (telephone)
+65 8299 7049 (mobile)
admin@jiangxia.com.sg
8 Temasek Boulevard, Suntec Tower 3 , #21-03, Singapore 038988

Drop us a message!

Hello!

Contact Us

+65 6686 6666 (telephone)
+65 8299 7049 (mobile)
admin@jiangxia.com.sg
8 Temasek Boulevard, Suntec Tower 3 , #21-03, Singapore 038988

Drop us a message!

+65 6686 6666
+65 8299 7049

admin@jiangxia.com.sg

8 Temasek Boulevard, Suntec Tower 3
#21-03, Singapore 038988

Copyright © 2024 | Privacy Policy