Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to protect digital information from unauthorized access using conversion into unintelligible codes. - Convert plaintext into ciphertext to obscure data at rest and in transit - Manage and customize encryption keys and administrative access
109 results
payShield 10K, the fifth generation of payment HSMs from Thales, delivers a suite of payment security functionality proven in critical environments including transaction processing, sensitive data protection, payment credential issuing, mobile card acceptance and payment tokenization. Like its predecessors over the past 30+ years, payShield 10K can be used throughout the global payment ecosystem by issuers, service providers, acquirers, processors and payment networks.
CipherTrust Transparent Encryption delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments. The deployment is simple, scalable and fast, with agents installed at operating file-system or device layer, and encryption and decryption is transparent to all applications that run above it. CipherTrust Transparent Encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost. Implementation is seamless keeping both business and operational processes working without changes even during deployment and roll out. The solution works in conjunction with the FIPS 140-2 up to Level 3 compliant CipherTrust Manager, which centralizes encryption key and policy management for the CipherTrust Data Security Platform.
Tresorit’s vision is to give you full control over your data across all business processes while making it easier for employees to incorporate security and privacy into their daily activities. At each step in our product journey, we’ve moved closer to giving customers the easy-to-use security tool that fits seamlessly into workflows. Starting with our secure workplace environment, moving into our external file sharing capabilities and our email encryption solution, and more recently with the addition of our secure contract management solution (eSign) - we focus on all the end users in customer organizations. - Employees need an easy encryption solution. - IT teams need visibility into risk. - Compliance teams need documentation. We constantly add capabilities for more teams, including procurement and legal. Tresorit is fully compliant with - GDPR - CCPA - HIPAA - TISAX (Chapter 5) - ITAR - FINRA At Tresorit, we believe that privacy is a human right.
u.trust LAN Crypt – the software-based data encryption solution u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management. The cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% independent from the (cloud) providers you may use. On top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Carat offers an innovative, cutting-edge Encryption and Tokenization solution focused on protecting sensitive card data that delivers a multi-layered approach for end-to-end security including Encryption for data in motion and Tokenization for data at rest. Our solution: - Provides Omnichannel tokenization across a merchant’s environment - Supports PCI compliance with data privacy rules and regulations - Protects consumers’ card data to boost new customer acquisition and strengthen retention
Accelerate your business with a first-class payments stack. Most companies use Evervault to: ◆ Expedite the security and compliance requirements of launching a card product ◆ Improve payment costs and global coverage with a multi-processor payment setup ◆ Share card data securely while keeping compliance scope to a minimum ◆ Easily prove to enterprise customers that their data is handled with maximum security. The platform is comprised of four simple primitives for securing payments data — Relay, Functions, UI Components, and Enclaves — as well as specific extensions like Network Tokens and Card Insights, which help optimize payments and maximize revenue.
Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business.
EncryptTitan is a full featured encryption system for MSPs & Enterprises that allows users to exchange information securely via email. ?EncryptTitan provides organizations with the tools needed to adhere to state and federal privacy regulations while protecting their organization. ??100% Cloud based: No on site hardware required. Send unlimited encrypted email using a secure solution. Ultimate scalability. ??Data Loss Prevention: Prevent employees sharing unsecured data or employee misuse of email. ??Compliance: EncryptTitan helps users meet compliance requirements for protecting sensitive, private information. Providing data breach protection and avoiding costly fines and penalties. ??Security: EncryptTitan seamlessly encrypts messages and attachments for an added layer of security. Email messages are?encrypted by the sender, and can only be decrypted by the intended recipient on their device. ??Brand Protection.
Anti-ransomware encryption solution Ransomware Encryption Protection is a revolutionary 100% signature-free solution, that protects your devices against malicious encryption attempts initiated during ransomware attacks. Reducing the Detection Gap Heimdal? Security’s anti-ransomware software has the lowest false-positive rate in the market on account of our Intelligence, which allows us to study malicious behavior in a safe environment. Retracing Ransomware Attacks Become a hunter or investigator with REP. Review incident details such as timestamps, tree diagrams with process callbacks, PowerShell scrips, computed MD5 hash, enumeration of read or write operation performed during encryption attempts, command-line arguments, the signature of malicious process, owner, and many more. Efficient against Unknown Threats REP’s impeccable Threat Intelligence makes it deadly effective even against unknown or unclassified ransomware.