Protects network against unwanted and dangerous traffic by decrypting and inspecting SSL traffic without full man-in the-middle decryption. Available as software or hardware.
Network hardware designed to transparently encrypt telephone communications. Supports commercial off-the-shelf communication equipment and mobile devices. Intended for military, governments, emergency
Network hardware solution for defense organizations, governmental authorities and intelligence organizations up to the highest security level. Features include allowing users to select core encryption
A modern SSH server for remotely accessing clusters of Linux servers via SSH or HTTPS. It is intended to be used instead of sshd. It enables teams to easily adopt the best SSH practices.
Voice encryption software and hardware for enterprise. SeeCrypt Voice Gateway enables encrypted calls and messaging over network from mobile devices running SeeCrypt apps for mobile and desktop.
Network attached Hardware Security Modules (HSMs), are dedicated appliances that perform cryptographic services to application and hosting servers, to include data encryption, digital signatures, key