Router that routes all traffic through cjdns-based VPN and/or meshnet. Includes a VOIP telephone and one year subscription. Provides all the apps needed like email, web browsing, and file sharing for
A managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys.
A network hardware device that encrypts all data and meta-data between other TrutzBox users. In addition it can be used to access the internet similar to using a VPN except the user is running it loca
An open source enterprise distributed openVPN and IPsec server. Provides client to cloud and cloud to cloud VPN. Features five layers of authentication, VPC and AWS integration. Free plan.
Encrypted email for business and enterprise using TLS. Email text is not encrypted only the packets being transported over the internet are encrypted. Intended for communicating with users outside of
Protects network against unwanted and dangerous traffic by decrypting and inspecting SSL traffic without full man-in the-middle decryption. Available as software or hardware.
Network hardware that prevents Man-in-the-middle attacks ie: fake cell sites like Stingray by connecting encrypted calls between secure mobile phones and any standard phone set acting as an extension
Network hardware solution for defense organizations, governmental authorities and intelligence organizations up to the highest security level. Features include allowing users to select core encryption