Results for: cryptography

Suggested Categories:

Post-Quantum Cryptography (PQC) Software
Post-quantum cryptography (PQC) software refers to cryptographic systems and algorithms designed to secure data against the potential future threat posed by quantum computers. Traditional cryptographic methods, such as RSA and ECC (Elliptic Curve Cryptography), rely on the difficulty of certain mathematical problems that could be solved efficiently by a sufficiently powerful quantum computer. Post-quantum cryptography focuses on developing new cryptographic protocols that are resistant to quantum computing threats, utilizing algorithms based on lattice-based, hash-based, multivariate, or code-based cryptography. This software ensures that data remains secure even in the era of quantum computing, offering a bridge between today's cryptographic practices and the future landscape of quantum-enhanced threats.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.

26 Products for "cryptography" with 2 filters applied:

  • 1
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and...
    Starting Price: $1.25 per month
  • 2
    Crypto Chain Wire

    Crypto Chain Wire

    Crypto Chain Wire

    Crypto press release distribution is an essential component of any content marketing strategy. Crypto Chain Wire is a High-Grade Crypto Press Release Dissemination Platform, providing updated news regarding the environment of cryptography to pertinent audiences. It's a powerful way to get your message out to the world and reach a wide audience. When done correctly, press releases can be effective in driving traffic, generating leads and creating brand awareness. In the ever-competitive crypto industry, having a steady stream of press releases is key to remaining competitive and successful.
  • 3
    OpaqueVEIL
    ...The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 4
    IDEMIA

    IDEMIA

    IDEMIA

    ...Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. And while connections and transactions are increasingly streamlined and seemingly effortless, we tap into cryptography expertise and leadership to ensure they are safe.
    Starting Price: Free
  • 5
    Gataca

    Gataca

    Gataca

    ...Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 6
    .ID Signatures
    .ID signatures are based on your true identity, secured by the toughest cryptography and identity verification. Sign any digital document with confidence! .ID platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a click of your pin code or just a thumbprint. .ID platform is using banking grade authentication to secure your files and protect them from intruders. ...
    Starting Price: €7.90 per month
  • 7
    Tuta

    Tuta

    Tuta

    Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices. Tuta is committed to using renewable energy to power its servers, ensuring privacy while contributing to a greener future.
    Starting Price: €1.20 per month
  • 8
    wolfSSL

    wolfSSL

    wolfSSL

    ...We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 9
    USDX Wallet

    USDX Wallet

    Lighthouse Blockchain Technology

    ...Setting up an account in the wallet takes only a minute. And best of all, there are no fees for payments in USDX. The wallet’s security is implemented at multiple levels. The primary defense is asymmetric cryptography, which is an essential component of cryptocurrencies. Your private key is encrypted and stored safely; only you can decrypt it and perform transactions. The use of distributed ledger technology ensures that all transactions are irreversible. Moreover, your account is linked to your mobile phone number, preventing unauthorized access and enabling two-step authentication. ...
  • 10
    Maiar

    Maiar

    Maiar

    ...Invite your friends and followers to try Maiar and get up to 100% of our commission every time they buy crypto! They'll receive a nice cashback reward, too. At Maiar we help you protect your crypto with the highest level of security via cryptography and privacy features.
  • 11
    LISNR Point
    ...We enable device agnostic transmission and software allowing client control of the experience, transport layer & business model. Flexibility to support encryption, cryptography, key exchange alongside full duplex, multi-channel features, we can enable the most secure transmission method. Faster & more seamless checkout experiences enabled with the combination of range and experience control.
  • 12
    Aztec

    Aztec

    Aztec

    ...Network observers can’t even see which asset or service a transaction belongs to. Aztec is built on PLONK, the new superfast standard in universal SNARK technology, created by our world-class cryptography team. Private transactions are computed in seconds on all devices, and our rollup service saves gas and settles in minutes. Fund and manage your DeFi positions anonymously, and trade them inside the Aztec privacy shield. Program private money, escrow, money streaming, micropayments, your imagination is the limit.
  • 13
    Fluence

    Fluence

    Fluence

    ...Fluence network executes applications without a single coordination center, eliminating potential failure and censorship. Nodes run only applications they are interested in or that are commercially viable. Computations are secured with cryptography and no data leaks to untrusted peers. The network serves a diverse set of computing providers, hardware, and available services. Leverage the power of Web 3 by connecting decentralized storage, identity, and on-chain smart contracts to your Fluence application. Make full-featured apps with community-built integrations to Web 3 networks.
  • 14
    Akamai MFA
    ...Prevent employee account takeovers and data breaches with phish-proof MFA. Stop MFA bypass attacks with the most secure standard for multi-factor authentication. Make MFA unfishable with end-to-end cryptography. No clunky physical security keys. Simplify adoption with self-service enrollment and an easy smartphone app experience. Get the strongest authentication with FIDO2. Increase security, not hardware. Reduce the workload on administrators. FIDO2 MFA security on any smartphone defeats phishing with frictionless push notifications. ...
    Starting Price: Free
  • 15
    Keyote

    Keyote

    TeskaLabs

    Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. ...
  • 16
    Confide

    Confide

    Confide

    ...Messages disappear forever after they are read once, making them as private and secure as the spoken word. Confide’s patented ScreenShield technology keeps your communication safe by preventing screenshots of your messages. Confide utilizes industry-standard cryptography to keep your messages safe and secure. We combine this with a simple and intuitive user experience to provide superior security, with no configuration required. All messages between Confide users are end-to-end encrypted. Encryption keys are generated locally on each device and the private key never leaves the device, ensuring that only the intended recipients can read your messages. ...
    Starting Price: $4.99 per user per month
  • 17
    Acra

    Acra

    Cossack Labs

    ...Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. ...
    Starting Price: $10000 per year
  • 18
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! ...
  • 19
    HitBTC

    HitBTC

    HitBTC

    ...HitBTC was the first on the market to offer automated and algo traders reliable and fast REST, WebSocket and FIX API. To maintain the security of our platform, we deploy comprehensive audited cryptography schemes with strict operational procedures as well as user-specified white lists and limits.2-factor authentication, advanced encryption technology, cold storage – we give you peace of mind when it comes to security. es to security. Our terminal is built on the best technology and lets you trade effortlessly any of the HitBTC currency pairs. ...
  • 20
    Lumi Wallet

    Lumi Wallet

    Lumi Wallet

    Lumi Wallet is a secure and trusted wallet for all your cryptocurrencies. Engineered with maximum security, Lumi Wallet protects cryptocurrency owners by using high-level encryption standards and advanced cryptography. Private keys are stored only on your device and no private data ever goes to servers. Lumi Wallet supports Bitcoin, Ethereum, EOS, BCH, and more than 1200 ERC20 tokens. We constantly review and add new coins according to the popular demand, credibility, and value of the digital asset. Transparency and decentralization are the key concepts of blockchain technology. ...
  • 21
    Privakey

    Privakey

    Privakey

    ...Transaction intent verification (TIV) is the combination of strong identity assurance and contextual response into one intuitive user experience. Common examples of TIV include payment confirmations, wire transfer approvals and account update acknowledgements. Our solution utilizes asymmetric cryptography, mobile biometrics and secure notifications to ensure the integrity of every exchange.
  • 22
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
    Starting Price: Free
  • 23
    Coinomi

    Coinomi

    Coinomi

    ...All supported assets can be exchanged instantly from within the app via built-in exchanges. Your private keys never leave your device. Strong wallet encryption and cryptography guarantee that your funds will remain safe under your ultimate control. No KYC bureaucracy to access your funds, no IP association, no identity linking, no transactions tracking. Our servers anonymize your requests by hiding your IP address from prying eyes. Constant operation since 2014, never hacked, no user has ever lost funds due to Coinomi.
  • 24
    Unbound Crypto Asset Security Platform
    ...With Unbound’s Crypto Asset Security Platform (CASP) you can define multi-party risk-based approval policies that adhere to local regulations, can integrate HSMs and offline signers into one MPC based platform. A FIPS 140 L2 certified software solution that eliminates this single point of failure of public-key cryptography by giving you a secure, distributed way to sign transactions while managing all your digital assets. With Unbound CASP, institutional investors don’t have to choose between regulatory adherence, peace of mind, and asset productivity. One comprehensive system that safeguards digital assets in both ‘cold’ and ‘hot’ vaults, while using MPC-based workflows and approval policies to secure the transfers between the two types of vaults. ...
  • 25
    Ostorlab

    Ostorlab

    Ostorlab

    ...With a few clicks, gain valuable insights to strengthen security and protect against potential threats. From insecure injection and outdated dependencies to hardcoded secrets and weak cryptography, Ostorlab automates security assessments and identifies privacy issues. Ostorlab empowers security and developer teams to analyze and remediate vulnerabilities efficiently. Experience hands-off security with Ostorlab's continuous scanning feature. Automatically trigger scans on new releases, saving you time and effort while ensuring continuous protection. ...
    Starting Price: $365 per month
  • 26
    Fireblocks

    Fireblocks

    Fireblocks

    ...Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. Enjoy peace of mind with the only insurance policy that covers assets in storage, transfer and E&O. SOC 2 Type II and regular pen testing from ComSec and NCC Group.
  • Previous
  • You're on page 1
  • Next