Search Results

We have found 87 items matching your search query.

fallback-no-image-1750

I2P

An anonymous network. An overlay network designed to protect against surveillance and monitoring by third parties.
fallback-no-image-1918

Enigmabox

Router that routes all traffic through cjdns-based VPN and/or meshnet. Includes a VOIP telephone and one year subscription. Provides all the apps needed like email, web browsing, and file sharing for
fallback-no-image-2598

AWS Key Management

A managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys.
fallback-no-image-1781

Centurion Layer-2 Encryptor

A network hardware solution appliance that is autonomous and operates independently in point to point or large WAN networks.
fallback-no-image-2077

TrutzBox

A network hardware device that encrypts all data and meta-data between other TrutzBox users. In addition it can be used to access the internet similar to using a VPN except the user is running it loca
fallback-no-image-2881

Pritunl

An open source enterprise distributed openVPN and IPsec server. Provides client to cloud and cloud to cloud VPN. Features five layers of authentication, VPC and AWS integration. Free plan.
fallback-no-image-1815

Senetas CN encryptors

Network encryption hardware for enterprise.
fallback-no-image-2421

SecureMail

Encrypted email for business and enterprise using TLS. Email text is not encrypted only the packets being transported over the internet are encrypted. Intended for communicating with users outside of
fallback-no-image-1754

XG Firewall

Protects network against unwanted and dangerous traffic by decrypting and inspecting SSL traffic without full man-in the-middle decryption. Available as software or hardware.
fallback-no-image-1950

CryptoGateway

Network hardware that prevents Man-in-the-middle attacks ie: fake cell sites like Stingray by connecting encrypted calls between secure mobile phones and any standard phone set acting as an extension
fallback-no-image-2603

credstash

An open source utility for managing credentials on AWS. Uses Amazon’s KMS to generate keys.
fallback-no-image-1783

Omnicrypt

Network hardware solution for defense organizations, governmental authorities and intelligence organizations up to the highest security level. Features include allowing users to select core encryption