Search Results

We have found 109 items matching your search query.

fallback-no-image-1815

Senetas CN encryptors

Network encryption hardware for enterprise.
fallback-no-image-1941

Silent Phone

Mobile VOIP software and hardware. Features messaging and file transfer. Silent Phone was sold to Office Tone in August 2018.
fallback-no-image-2723

VivoKey

An implantable NFC platform for identity, security, cryptography, and payment applications.
fallback-no-image-1461

SecuriVPN ISA

A hardware based network encryptor that provides the means for extending an organizations’ protected IP networks securely over an untrusted network. For enterprise and governments.
fallback-no-image-1861

Safexs Guardian XT 

USB drive that come with encryption software installed.
fallback-no-image-2021

Panthon

Hardware encrypted voice via a Micro SD card. Intended for business, enterprise and governments. Features true random number generator, call and messaging history is encrypted, encrypted phonebook. Ap
fallback-no-image-3057

Keezel

A portable, one button, battery operated VPN router. Uses it’s own VPN service which includes PureVPN, ProXPN, and LeVPN. Requires annual subscription.
fallback-no-image-1769

JaCarta

A line of USB and smartcards for use with network and PC authentication. Feature multi-factor authentication, public key infrastructure (PKI) or GOST encryption, biometric identification and one-time
fallback-no-image-1884

Aegis Padlock

Hardware encrypted hard drives. HDD and SSD. PIN pad and bio-metric. Portable and desktop. Feature brute force protection and FIPS 140-2 Level 2 Validation. 120 GB to 8 TB.
fallback-no-image-2084

Crypto Network

A wide range of network encryption hardware devices intended for business, enterprise, governments and military.
fallback-no-image-1817

Entrust

Network hardware messaging encryptor. Sits between the network and the mail server encrypting and decrypting messages.
fallback-no-image-1944

Secure Phone

Secure mobile phone. Features include encrypted email and messaging. 10+ ways to secure wipe, secure bootloader, locates and protects phone from connecting to fake cell sites, ie: Stingray. Remote man