Network

We have found 64 items matching your search query.

fallback-no-image-1779

Sectra Ternety

Hardware solution that encrypts and protects the network and its connected units from intrusion and data retrieval. The computers connected to the various local networks perceive that they are connect
fallback-no-image-2305

Matrix

An open standard for decentralized real-time communications. Can be used for messaging, VOIP, internet of things or anywhere an HTTP API is needed. Includes the option for client apps to integrate end
fallback-no-image-1810

Vormetric Data Security Platform

Network data encryption for enterprise. Features transparent file-level encryption, application-layer encryption, tokenization, cloud encryption gateway, integrated key management, and security intell
fallback-no-image-2695

MaidSafe

Also known as The SAFE Network it is an open source decentralized network that uses the unused storage space, processing power and data connection of it’s users. Files uploaded to the network ar
fallback-no-image-1750

I2P

An anonymous network. An overlay network designed to protect against surveillance and monitoring by third parties.
fallback-no-image-1950

CryptoGateway

Network hardware that prevents Man-in-the-middle attacks ie: fake cell sites like Stingray by connecting encrypted calls between secure mobile phones and any standard phone set acting as an extension
fallback-no-image-1781

Centurion Layer-2 Encryptor

A network hardware solution appliance that is autonomous and operates independently in point to point or large WAN networks.
fallback-no-image-2407

Key Manager Plus

A web-based key management solution for enterprise IT that allows you to consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer
fallback-no-image-1815

Senetas CN encryptors

Network encryption hardware for enterprise.
fallback-no-image-2725

Kovri

A secure, private, untraceable C++ fork of the I2P anonymous network by the Monero-Project. In Pre-Alpha.
fallback-no-image-1754

XG Firewall

Protects network against unwanted and dangerous traffic by decrypting and inspecting SSL traffic without full man-in the-middle decryption. Available as software or hardware.
fallback-no-image-1964

SAPPHIRE

Network hardware designed to transparently encrypt telephone communications. Supports commercial off-the-shelf communication equipment and mobile devices. Intended for military, governments, emergency