Search Results

We have found 87 items matching your search query.

fallback-no-image-2163

IONU

Enterprise level file encryption and sharing. Using transparent encryption technology files are transmitted over a Data Protection Network (DPN)
fallback-no-image-2919

DNS over HTTPS

An open source project that allows you to do DNS resolves over HTTPS for privacy, performance and security.
fallback-no-image-1823

Cryptosense Analyzer

Evaluates Java security applications for compliance with company cryptographic standards. Uses a Java Agent attached to the JVM to trace crypto calls.
fallback-no-image-2462

telehash

An open source encrypted mesh networking protocol.
fallback-no-image-1767

CryptoPro IPSec

A set of protocols for protection of information on the network. Uses GOST 28147-89 encryption. Company provides a range of encryption security products.
fallback-no-image-1968

SeeCrypt

Voice encryption software and hardware for enterprise. SeeCrypt Voice Gateway enables encrypted calls and messaging over network from mobile devices running SeeCrypt apps for mobile and desktop.
fallback-no-image-2648

BeyondCorp

BeyondCorp is a Zero Trust security framework used by Google that moves access controls from the perimeter to individual devices and users allowing employees to work securely from any location without
fallback-no-image-1791

Freedombox

A secure network protocol designed to facilitate communications among users with or without internet access. Features include, encrypted web proxies, VOIP, email, and mesh networking. In testing.
fallback-no-image-2291

CrypTech

A project that is developing an open-source hardware cryptographic engine design that meets the needs of high assurance Internet infrastructure systems that use cryptography. The open-source hardware
fallback-no-image-3044

Mole

Creates SSH tunnels.
fallback-no-image-1825

Atmedia Ethernet Encryptor

Network communications encryption hardware for enterprise.
fallback-no-image-2496

Vault

An open source key manager. Handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or gen