Cloud management and networking for enterprise. Integrates with AWS, Azure and Google Cloud Platform. Features VPC and an IPSec VPN. Hardware and software.
A set of protocols for protection of information on the network. Uses GOST 28147-89 encryption. Company provides a range of encryption security products.
A network hardware device that encrypts all data and meta-data between other TrutzBox users. In addition it can be used to access the internet similar to using a VPN except the user is running it loca
A secure network protocol designed to facilitate communications among users with or without internet access. Features include, encrypted web proxies, VOIP, email, and mesh networking. In testing.
A line of USB and smartcards for use with network and PC authentication. Feature multi-factor authentication, public key infrastructure (PKI) or GOST encryption, biometric identification and one-time
A true peer-to-peer network connects only to users also running Freenet. You can anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and cha
Voice and messaging without the internet. Features mesh networking, offline maps, and 3000mAh lithium ion battery. Hardware connects via Bluetooth and enables communication with other Beartooth users