Search Results

We have found 244 items matching your search query.

fallback-no-image-2689

Tresorit

Cloud encryption and file sharing for businesses and personal use. Features end-to-end encryption, PKI and encrypted links for sharing files. Datacenters are located in Ireland and the Netherlands.
fallback-no-image-421

Cyren Email Security

Emails are routed through their servers via a change in the MX-Records thus providing encryption and other services. Guarantees secure email communication with select communication partners using SMTP
fallback-no-image-877

HipLink

Enterprise messaging for Healthcare, Public Safety, Corrections, IT, Utilities and Transportation. Desktop and mobile paging and mass notification.
fallback-no-image-1471

Ultra Encrypt Net

Hardware VPN IPsec encryptors for business and enterprise.
fallback-no-image-1773

AhnLab TrusGuard

Integrated network security hardware. Features simultaneous support for IPSec and SSL VPN.
fallback-no-image-1933

PrivateWave

Voice apps for mobile devices. Features security compliance with FIPS, NIST and NSA.
fallback-no-image-2077

TrutzBox

A network hardware device that encrypts all data and meta-data between other TrutzBox users. In addition it can be used to access the internet similar to using a VPN except the user is running it loca
fallback-no-image-2349

RMail

Encrypted email. Use with existing desktop and web email clients. Features proof of delivery, no software needed for recipient to open and read encrypted message. Free trial.
fallback-no-image-2906

VSFileHash

VSFileHash is a cryptographic hash generation software.
fallback-no-image-524

Swissmail

Encrypted email for businesses. Works with existing email clients including mobile.
fallback-no-image-994

VEIL Mobile Slick

A mobile solution for business and enterprise that utilizes a standards-based and patented key management encryption system that forms the foundation of TecSec’s product line. VEIL is a cryptographi
fallback-no-image-1642

Kodex

Cloud storage and messenger. Allows for searching data while it remains encrypted.