Product and Services Finder

Encryption

    
<  1  2  3  4  5  6  11  14  >
Enova Technology Corporation  encryption hardware; encryption server; USB drive encryption
 
SecureNAS T1 SecureNAS T1 is a real-time encrypted networked storage server that equips users with proven data-at-rest security, advanced security architecture, secure...
 
X-Wall FX X-Wall FX, the USB/SATA cryptographic bridge processor, is capable of conducting real-time full-disk encryption over the connected SATA disk drives. It...
 
Cryptzone Group  Cryptzone supplies organizations with tools for File encryption, Email encryption, Microsoft SharePoint encryption, USB flash drive encryption and Secure Remote Access control.
 
Secured eCollaboration A unique add-in solution for Microsoft SharePoint® providing document encryption and access control, creating a secure environment for collaboration.
 
Secured eDisk Protect An enterprise level solution for full hard disk encryption with powerful central control and management.
 
WinMagic  Leaders in data encryption solutions for global enterprises to help protect data residing in desktops, laptops, mobile devices, removable media and servers.
 
SecureDoc Disk Encryption for Mac WinMagic’s SecureDoc for Mac OS protects the entire contents of a laptop or desktop. SecureDoc extends the protection of 256-bit AES hard disk encryption...
 
SecureDoc for HP Fully managed enterprise ready encryption solutions for HP devices
 
Ciphertex  portable, encrypted data storage and server solutions for EHR, document imaging, secure transportation, government, military, aerospace, healthcare, production to post, entertainment, data courier, networks, forensics.
Redvers Consulting  Technical solutions for COBOL: including a COBOL XML parser/generator, AES encryption and data compression.
 
Redvers Encryption Device AES Encryption
 
Software Products for COBOL To address the problem of an ever shrinking pool of COBOL skills, Redvers Consulting offers a range of software products that address the more complex tasks...
SECUDE  SECUDE is a leading global provider of data security solutions. Our solutions portfolio includes full disk encryption, mobile and cloud security, secure authentication and regulatory compliance.
DataMotion, Inc.  DataMotion’s secure information delivery solutions help customers achieve regulatory compliance through visibility, security and reporting of data in motion, and include encrypted e-mail, file transfer, electronic forms...
 
eForms DataMotion secure eForms provides a powerful tool for your customers and partners to securely submit information for automatic integration into your back...
 
IIT Platform The DataMotion IIT platform enables organizations to securely move data and email through the internet using an organization’s existing infrastructure....
 
CoSoSys  CoSoSys is specialized in network Device Control, Data Loss Prevention (DLP) for Windows, Mac OS X and Linux, Mobile Device Management (MDM) and Mobile Application Management for iOS and Android and development of...
 
EasyLock - USB and Portable Device Encryption EasyLock is an enterprise grade portable data encryption solution (256bit AES) for every computer user, from novice to expert, turning any mobile storage...
 
Endpoint Protector 4 - DLP, Device Control and MDM solution for SMBs and Enterprises DLP, Device Control and MDM solution to protect your network from the threats posed by portable storage devices, uncontrolled data transfers to online...
 
PMC Ciphers  PMC is the inventor of Polymorphic Encryption, a unique technology that compiles conceptually different and ultra-secure ciphers from the key. We thus take advantage of something truly ultimate: more algorithms than there...
 
File Encryption In One Block File Encryption In One Block is a very basic tool that can encrypt and decrypt single files. It's a showcase for PMC Ciphers' new Polymorphic Giant Block...
 
TurboCrypt Disk Encryption TurboCrypt enables users of all levels to store their valuable information in an ultra-secure way. TurboCrypt has been designed to withstand all known...
Shoghi Communications Ltd.  Shoghi Company-Leaders in Defense Encryption Technology,Intelligence Surveillance Reconnaissance,Electronic Warfare,communication monitoring,defense electronics,integrated electronic defense technologies,network security...
 
Algorithms Customization Most of government organisations defines there own custom encryption algorithm to assure 100% security rather than using globally well known algorithms or...
 
Area Protection Jammer Area Protection System is designed to protect a defined area from threats like unwarranted communications, RCIED’s or Satellite navigated threats.
 
Inv Softworks LLC.  Since 1999, Inv Softworks LLC. are dedicated to providing top quality encryption software for both corporate and home use. They have significant experience developing file encryption software, and they are glad to offer...
 
Kryptel Kryptel is a file encryption tool that provides a high level of security and is easy to learn and use. It’s an excellent single-click solution for data...
 
Silver Key Silver Key produces a self-extracting encrypted parcel, which contains the data you want to protect from prying eyes. The recipient does not need to install...
Linoma Software  Specialties Includes: Database Management and Encryption, Secure File Transfer, Data Transformation, Compression, Java, FTP, SFTP, FTPS, SSL, HTTPS. Operating Systems Include: Windows, Linux, IBM i (iSeries), IBM System...
 
Crypto Complete Automated Field, File and Backup Encryption
 
GoAnywhere Director Managed File Transfer Solution
 
Zix Corporation.  ZixCorp has become the leader by designing its solutions with your most important relationships in mind and gaining the trust of the nation’s most influential institutions in healthcare, finance and government. ZixCorp...
 
ZixConnect ZixConnect is a managed Transport Layer Security (TLS) service that lets companies encrypt emails to send to multiple partners using a single TLS...
 
ZixDirect ZixDirect takes the business need for confidential data delivery and pairs it with the customer-friendly expediency of direct inbox delivery. ZixDirect is...
 
<  1  2  3  4  5  6  11  14  >
More

Encryption Research Library

Introduction to Encryption
LockLizard
The Shorter Oxford English Dictionary lists the 5th meaning of the word cipher as, “A secret manner of writing by any of various methods, intelligible only to those possessing the key (1528).” Encryption, the use of ciphers, is not new. Far from it. It has been with us for a very long time. I used to say that encryption was traditionally for the four P's. Princes, Popes, Purveyors and Paramours, ...
 
AES Encryption for COBOL
Redvers Consulting
This white paper isn’t going to try to sell you the concept of data encryption. If you’re reading this, you already know you need to encrypt confidential information. What this document will do, is help you fit the encryption process simply and securely into COBOL applications without the need for expensive encryption specialists. Essentially, encryption protects data that needs to be kept ...
 
PDF Encryption and Security
LockLizard
Adobe PDF Encryption and Security History The Adobe ™ PDF document format has been in development since 1991, and from as early as 1994 included security features that were aimed at preventing users from being able to make changes to a published documents. This involved the use of encryption as the only practical way of protecting information. The basis of PDF encryption is to prevent users ...
 
Encryption Methods for Securing Data
10ZiG Technology
Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has a significant value, either directly or indirectly, that requires protection. It is common to find data transmissions equating to billions of dollars transferred daily. At all company levels from small to ...
 
Encryption is not enough for DRM
LockLizard
Now let's be clear right from the start that if you want to have any kind of control over the content of an electronic document you have first of all got to use encryption. But encryption is only the start of implementing a DRM service. Poorly packaged encryption, badly thought out licensing, integration that exposes weaknesses in the packaging of the method for displaying the document, are all ...
 

Encryption Video

EasyLock - Cross platform encryption for Windows, Mac OS X and Linux CoSoSys
 
Managed File Transfer: Challenges and Solutions Coviant Software Real-world examples of how Diplomat Managed File Transfer streamlined file transfer processes by improving automation, integration and control of secure ...
 
Encryption Kofax Ltd Products

Encryption News

Encryption INetU, Inc. Technology
Encryption IBS America, Inc Technology
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.