Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to protect digital information from unauthorized access using conversion into unintelligible codes. - Convert plaintext into ciphertext to obscure data at rest and in transit - Manage and customize encryption keys and administrative access
107 results
payShield 10K, the fifth generation of payment HSMs from Thales, delivers a suite of payment security functionality proven in critical environments including transaction processing, sensitive data protection, payment credential issuing, mobile card acceptance and payment tokenization. Like its predecessors over the past 30+ years, payShield 10K can be used throughout the global payment ecosystem by issuers, service providers, acquirers, processors and payment networks.
Tresorit’s vision is to give you full control over your data across all business processes while making it easier for employees to incorporate security and privacy into their daily activities. At each step in our product journey, we’ve moved closer to giving customers the easy-to-use security tool that fits seamlessly into workflows. Starting with our secure workplace environment, moving into our external file sharing capabilities and our email encryption solution, and more recently with the addition of our secure contract management solution (eSign) - we focus on all the end users in customer organizations. - Employees need an easy encryption solution. - IT teams need visibility into risk. - Compliance teams need documentation. We constantly add capabilities for more teams, including procurement and legal. Tresorit is fully compliant with - GDPR - CCPA - HIPAA - TISAX (Chapter 5) - ITAR - FINRA At Tresorit, we believe that privacy is a human right.
CipherTrust Transparent Encryption delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments. The deployment is simple, scalable and fast, with agents installed at operating file-system or device layer, and encryption and decryption is transparent to all applications that run above it. CipherTrust Transparent Encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost. Implementation is seamless keeping both business and operational processes working without changes even during deployment and roll out. The solution works in conjunction with the FIPS 140-2 up to Level 3 compliant CipherTrust Manager, which centralizes encryption key and policy management for the CipherTrust Data Security Platform.
Carat offers an innovative, cutting-edge Encryption and Tokenization solution focused on protecting sensitive card data that delivers a multi-layered approach for end-to-end security including Encryption for data in motion and Tokenization for data at rest. Our solution: - Provides Omnichannel tokenization across a merchant’s environment - Supports PCI compliance with data privacy rules and regulations - Protects consumers’ card data to boost new customer acquisition and strengthen retention
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Accelerate your business with a first-class payments stack. Most companies use Evervault to: ◆ Expedite the security and compliance requirements of launching a card product ◆ Improve payment costs and global coverage with a multi-processor payment setup ◆ Share card data securely while keeping compliance scope to a minimum ◆ Easily prove to enterprise customers that their data is handled with maximum security. The platform is comprised of four simple primitives for securing payments data — Relay, Functions, UI Components, and Enclaves — as well as specific extensions like Network Tokens and Card Insights, which help optimize payments and maximize revenue.
u.trust LAN Crypt – the software-based data encryption solution u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management. The cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% independent from the (cloud) providers you may use. On top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.
Anti-ransomware encryption solution Ransomware Encryption Protection is a revolutionary 100% signature-free solution, that protects your devices against malicious encryption attempts initiated during ransomware attacks. Reducing the Detection Gap Heimdal™ Security’s anti-ransomware software has the lowest false-positive rate in the market on account of our Intelligence, which allows us to study malicious behavior in a safe environment. Retracing Ransomware Attacks Become a hunter or investigator with REP. Review incident details such as timestamps, tree diagrams with process callbacks, PowerShell scrips, computed MD5 hash, enumeration of read or write operation performed during encryption attempts, command-line arguments, the signature of malicious process, owner, and many more. Efficient against Unknown Threats REP’s impeccable Threat Intelligence makes it deadly effective even against unknown or unclassified ransomware.
All-in-one-software-based solution that provides post-quantum cryptography protection and crypto-agility on top of your existing infrastructure. Secure your valuable data assets from today’s store now, decrypt later attacks and gain new controls over your cryptography.
Zunu for Business by Ziroh Labs offers advanced data security through Fully Homomorphic Encryption (FHE), ensuring your enterprise's data remains encrypted during transit, storage, and computation. This innovative approach allows for secure queries and computations on encrypted data, mitigating the risk of unauthorized access and data breaches. Zunu for Business includes products such as Zunu DB, Secure String, Secure Numeric, Secure Data Structures, and Messaging Gateway, providing comprehensive protection in an era of rampant cyber threats.