Filter
Locations
Result types
Type of company
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Lock keywords
Exclude keywords
Optional keywords
Verified
Encryption
Encryption Protect sensitive data and meet compliance requirements with Calico’s high-performance encryption for data in transit Get Started Contact Us Overview BenefitsCapabilities How It WorksResources Calico Cloud Overview Not all threats originate from outside...
by Calico
Verified
Encryption
Encryption | Our comprehensive encryption suite and supported devices include:
by LAWtrust
Verified
Email Encryption Features - Securely Send Email & Files | eSkyCity
Easily send sensitive information, large files, and eSign documents with a single click. Plus data leak protection, and compliance options.
by eSkyCity
Verified
Encryption | Enea
Encryption | Encryption Resource Hub | Retaining Network Traffic Visibility in the Encryption Era | Qosmos Technology for Visibility into Encrypted and Evasive Traffic | How to Survive the Encrypted Network Traffic Apocalypse | A New Way of Detecting TLS (SSL) MITM Attacks | First Packet Advantage: A New Approach to First Packet Classification for SD-WAN and SASE | Why is First Packet Classification So Important in Traffic Management? | Effective Ways to Manage Encrypted and Evasive Traffic | First Packet Processing: Boost the Performance of SD-WAN and SASE | YES! Encrypted Traffic Can (and Must) Be Classified | Qosmos ixEngine: Next-Generation DPI for Maximum Traffic Visibility | Enea’s next-generation DPI engine, Qosmos ixEngine, identifies over 4000 applications and protocols, more than any other on the market.
by Openwave Mobility
Verified
Email Encryption | AppRiver
Encryption, secured. | Encryption, secured. | Email Encryption is an essential part of Secure Cloud | Proven Content Filters | Transparent Delivery | Convenient Recipient Experience | Simplified Quarantined Messages | Break down old security barriers.Move forward with AppRiver. | Additional Features | Unleash your teams to become more productive, secure, and compliant in a complex, digital world. | Advanced Email Encryption Datasheet
by AppRiver
Verified
Homomorphic Encryption | CryptoExperts
Homomorphic Encryption | Related technology | Post-Quantum Cryptography | Related service | Design | Related research projects | HEAT | CRYPTOCOMP | The Concept of Homomorphic Encryption | Homomorphic Encryption for Many Applications | Why choose CryptoExperts | Related presentations & talks | Related publications
by CryptoExperts
Verified
Data Encryption - Halodata
Data Encryption Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus in rutrum velit, nec facilisis est. Vestibulum sed orci sagittis, tincidunt metus eu, tempus neque. Suspendisse nec dictum leo. Aenean urna nisl, tempus sit amet tortor at, hendrerit malesuada tortor. In id interdum quam, quis fringilla tortor. Fusce eget lacus ante. Praesent fringilla libero
by Halodata Group (Singapore Malaysia Indonesia)
Verified
Data encryption security code on a computer display. RNN Neural Network source code. Concept of security, programming and hacking, deep decryption and encryption. Abstract computer script code - National Centre for Universities & Business
Data encryption security code on a computer display. RNN Neural Network source code. Concept of security, programming and hacking, deep decryption and encryption. Abstract computer script code
by THE COUNCIL FOR INDUSTRY AND HIGHER EDUCATION
Verified
Email encryption
Email encryption | We don't just value your privacy. We protect it!
by East-Tec
Verified
WhatsApp Encryption - design/internet
WhatsApp Encryption - Instant messaging service Whatsapp has announced it will encrypt all its users' communications from Tuesday, April 5th.
by Design & Internet
San Diego, United States
11-50 Employees
2019
We built the Ubiq platform so that engineering, security, and compliance teams can build client-side encryption into their applications in minutes, through an easy-to-use, developer-first encryption-as-code platform. We help compliance teams ensure that applications are built compliant-by-design, with full auditability at scale. We strive to develop simple, effective products and customer experiences. Applications built compliant by design and future-proof evolving compliance needs - designed for today and tomorrow’s regulations, with full auditability. Ubiq is more than a vendor; they're a trusted security partner. Implementation was very straightforward and clearly designed with developers in mind, offering a familiar customer experience. Ubiq's encryption API provides robust protection for sensitive data with minimal integration effort, enabling us to effectively reduce the risk of data breaches and strengthen our defense.
+
Featured
Application-layer encryption made simple
... (SaaS) platform that enables development, security, and compliance teams to rapidly integrate application-layer encryption into any application in minutes. And empowers teams reduce the risk of data theft, free up precious resources, and build compliant and secure-by-design applications. ...
Stamford, United States
11-50 Employees
1986
Developers, OEMs, ISVs and companies of all sizes use Encryptionizer products to satisfy a pressing security need quickly, and with confidence to protect the safety, integrity and confidentiality of sensitive data. Encryptionizer provides transparent encryption protection for most popular databases and applications: SQL Server, PostgreSQL, MySQL, MongoDB, Legacy databases and more. How NetLib Security’s Encryptionizer assisted a nonprofit in their mission Compliance regulations continue to drive companies toward seeking optimal data security solutions. What do you think is the key to a successful sports team? Athlete data analytics is a hot topic in sports that offers a competitive advantage in more ways than one. Data is the language of our personal and professional interactions. It is the responsibility of those business partners to protect your data and that’s where compliance plays a critical role. Encryption has become an important tool for Compliance and Data Protection.
+
Featured
SQL Server Data Encryption Solution
... SQL Server Data Encryption by Encryptionizer, provides an additional layer of security to help meet compliance needs. ...
Spring Lake Park, United States
1-10 Employees
Founded in 1982, Software Diversified Services™ specializes in enterprise software products in key verticals such as banking, finance, insurance, retail, and government. SDS delivers comprehensive, affordable mainframe and distributed software with a focus on cybersecurity and compliance. The company has built its reputation on industry-leading software, documentation and support. In addition to E-Business Server, SDS offers more than 20 z/OS, z/VSE, and z/VM mainframe system products, including VitalSigns for FTP™, a product that automates enterprise-wide enforcement of security standards, and the VFTP-SSH Collaboration that provides SSH encryption for data in transit through networks. Regularly updated with state-of-the-art encryption algorithms and other security features, E-Business Server meets the stringent requirements of a wide range of auditing and compliance organizations, including the PCI (Payment Card Industry) Security Standards Council.
+
Featured
SDS E-Business Server® | EBS | PGP Encryption Product offers Powerful,Automated, Simplified Data Security
... E-Business Server delivers a suite of advanced data encryption and authentication tools that can be set up and managed from a single console. There’s no need to search for an E-Business Server Replacement! ...
Concord, United States
11-50 Employees
1961
Mission-critical Network Encryption to Secure Communications for governments, financial institutions, and corporations—where risk to critical information is unacceptable. No matter the terrain or location, TCC Secure Communications & Network Encryption products deliver. Offering superior-grade Network Encryption for Secure Communications of military and commercial telephone networks, commander's networks, missile firing systems, and other highly sensitive, tactical, command and control applications. TCC expands its Military and Law Enforcement DSP 9000, HSE 6000 LMR Voice Security product line with the addition of the HSE 6000 SEAL intercom voice encryptor. The HSE 6000 SEAL (Sea, Air, Land) is a Multi-Force, Multi-Platform, Rapid Response and Deployment COMSEC device for both vehicle and dismounted tactical operations. The HSE 6000 SEAL is a Body-Worn, Vest-Mounted, Battery-Powered, Small and Light in-line voice security device purposefully designed to seamlessly integrate with Naval, Airborne and Ground Intercom Systems (ICS). This product release also includes IPv6 operation and enhanced support for network redundancy. The Cipher X 7220 is the 10 Gb/s model of the TCC Cyber Security Appliances.
+
Featured
Cipher X Family: IP Encryption, Network Encryption - TCC | Summary
... Cipher X Family: IP Encryption, Network Encryption - TCC | ...
Sydney, Australia
11-50 Employees
2001
Jean-Claude is a veteran of the start-up and technology space, having founded and co-founded a number of companies in the last 20 years. Williams, Diageo, Samsung, Fairfax, BUPA and St George Bank to provide marketing, innovation and digital transformation services.
+
Featured
Securing and managing content and data via our proprietary session-based encryption method, NFT’s and Smart Contracts
... Securing and managing content and data via our proprietary session-based encryption method, NFT’s and Smart ...
Austin, United States
1-10 Employees
2015
At TAMOSI we have developed industry-leading technologies designed to change the way we think of computing, the Industrial Internet of Things (IIoT) and Industrial Control Systems (ICS) security. Tamosi's Advanced Computing Framework, leveraging Hybrid Computing, will champion a computational revolution. TAMOSI's Patented Advanced Computing Framework consists of innovative mixed-signal computation circuits to overcome problems of both digital and analog computing. With Tamosi's Patented Hybrid eXtreme Computer processing, you can run simulations at speeds between a Supercomputer and Quantum Computer. Tamosi's Chaotic Hybrid Encryption Engine (CHECK) and Crypto-Hybrid Engine (CHE), our first flagship products, are cyber-physical products that are the first of its kind. TAMOSI, LLC was incorporated in Austin, Texas in 2016. Emerging as the most important asset, information, and it's associated problems, are going to be paramount to solve. Solving these problems with energy-efficient computational power and pervasive information security is a balance these new technologies need to strive to achieve.
+
Featured
Encryption | TAMOSI | United States
... Tamosi enebles the future of Cybersecurity & Encryption for Industrial Internet Of Things (IIoT) & Industrial Control Systems (ICS) ...
Leesburg, United States
51-100 Employees
2014
Fornetix embraces the mission of making security seamless, rapid, flexible, scalable, and cost-effective in order to overcome the high complexity and unmanageable costs of legacy solutions. Fornetix is headquartered in Frederick, MD with a regional office in Los Angeles, CA. Harrington has been with Fornetix since its inception and brings over two decades of both legal and technical experience to the company. Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions to the federal government and enterprises around the globe. GDIT and Fornetix Conduct First-Ever Zero Trust at the Edge Demonstration at Talisman Sabre 2023 in Australia. Toffler brings 20 years of experience to Fornetix with a career that began in the US Army specializing in Radio Equipment Repair and Military Intelligence Systems. White is a technologist, inventor, entrepreneur, father, and husband. Kravetz is the co-founder and Chairman of Equity Orchestration, reviewing all business forecasts and financial and asset acquisitions activity of the company.
+
Featured
Why Encryption Key Management?
... Why Encryption Key Management? | ...
London, United Kingdom
11-50 Employees
2014
We are a team of experienced cryptographers and security software engineers. Following our mission to solve problems, we adapt solution designs to meet customer-specific requirements. At the core, we are an open-source company. Luckly, we are :) Our core competence is designing and implementing cryptography-based components, protocols, and systems. We provide risk assessment, strategic and tactical advice in line with pragmatic security and compliance demands. We provide constant oversight over features, match them to risks, and assist your engineers with implementing security-related features. We offer free assessment and mitigation services to improve Ukrainian companies security resilience. At Cossack Labs, we build security solutions to protect sensitive data in customers' products and infrastructures.
+
Featured
Database encryption solutions
... Transparent field-level encryption of sensitive fields before they reach the database. Protect the data against insiders, leaks and misconfiguration. ...
Bethesda, United States
1-10 Employees
2020
Managing Global Supply chains in today's quickly changing world is a real challenge. Exports of products, services and technologies are subject to controls from multiple jurisdictions including the International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Asset Controls (OFAC) Sanctions and Embargoes. Information Technology and Encryption products create an additional level of complexity. Export Control Webinars offers live webinars on the topics of current and pressing interest. Live webinars offer a live 30 minute "Question and Answer" session at the conclusion of each 60 minute webinar.
+
Featured
Advanced Encryption Classification Webinar
... is for export compliance officers, engineers, and legal practitioners who have experience with product classification and the use of encryption technologies in hardware and software applications. We will provide participants with classification exercises to complete prior to the webinar. ...
Encryption is the process of converting plain text into encoded text, using an algorithm and a secret key, in order to protect the original data from unauthorized access. Encryption ensures that only authorized parties can view the data.