[go: up one dir, main page]

Results for: cryptography

Suggested Categories:

Post-Quantum Cryptography (PQC) Software
Post-quantum cryptography (PQC) software refers to cryptographic systems and algorithms designed to secure data against the potential future threat posed by quantum computers. Traditional cryptographic methods, such as RSA and ECC (Elliptic Curve Cryptography), rely on the difficulty of certain mathematical problems that could be solved efficiently by a sufficiently powerful quantum computer. Post-quantum cryptography focuses on developing new cryptographic protocols that are resistant to quantum computing threats, utilizing algorithms based on lattice-based, hash-based, multivariate, or code-based cryptography. This software ensures that data remains secure even in the era of quantum computing, offering a bridge between today's cryptographic practices and the future landscape of quantum-enhanced threats.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

130 Products for "cryptography"

  • 1
    CLEAR

    CLEAR

    Quantum Knight

    ...It can be deployed online or offline and works on more than 30 types of modern operating systems and embedded equipment. Designed for maximum efficiency and simplicity, CLEAR can dramatically reduce energy usage at scale, relative to other legacy cryptography.
    Starting Price: Free
  • 2
    cryptography

    cryptography

    cryptography

    cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices.
    Starting Price: Free
  • 3
    SandboxAQ

    SandboxAQ

    SandboxAQ

    The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. ...
  • 4
    Naoris Protocol

    Naoris Protocol

    Naoris Protocol

    ...Naoris Protocol's mission is to restore cyber-trust in digital systems and data quality, while delivering verified cyber-status beyond enterprise borders, through continuous immutable verification, enhancing the integrity and reliability of global digital infrastructures. By integrating post-quantum cryptography, custom-built dPoSec consensus, and Decentralized Swarm AI, cyber risks are reduced by an order of magnitude while real-time proof of compliance can be shared between partners, ecosystems, and regulators. Operating under a community computing model, devices are rewarded for actively contributing compute and security validations to the mesh.
  • 5
    QuSecure QuProtect
    QuSecure's QuProtect is a comprehensive post-quantum cryptography software solution designed to secure data across various platforms, including network, cloud, IoT, edge devices, and satellite communications. It offers quantum-resilient cryptography, crypto-agility, zero-trust architecture, and quantum-strength keys, ensuring protection against both current and future cyber threats. QuProtect enables organizations to implement PQC with minimal disruption to existing systems, providing a seamless integration into their cybersecurity infrastructure. ...
  • 6
    PQShield

    PQShield

    PQShield

    PQShield offers a comprehensive suite of post-quantum cryptography solutions designed to future-proof digital infrastructures against the emerging threats posed by quantum computing. Their UltraPQ-Suite encompasses a range of hardware and software products optimized for various use cases, including ultra-fast, ultra-small, and ultra-secure implementations. PQShield's offerings include PQPlatform-Lattice, a compact, FIPS 140-3 CAVP-compliant cryptographic engine supporting lattice-based algorithms like ML-KEM and ML-DSA; PQPlatform-CoPro, which combines hash-based and lattice-based cryptography engines for seamless integration into existing security subsystems; and PQPlatform-TrustSys, a fully autonomous, PQC-focused root-of-trust subsystem designed for minimal integration effort and robust side-channel protection. ...
  • 7
    OpenSSL

    OpenSSL

    OpenSSL

    OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. OpenSSL is licensed under an Apache-style license, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions. For more information about the team and community around the project, or to start making your own contributions, start with the community page. ...
  • 8
    SSH NQX
    SSH NQX is a quantum-safe encryption solution designed to secure Ethernet and IP traffic across various networks, including public and private infrastructures. It employs advanced post-quantum cryptographic algorithms to protect data-in-transit from both current and future cyber threats. NQX delivers high-bandwidth performance, supporting data transmission speeds up to 100 Gbps, ensuring seamless and secure communication between enterprise sites, networks, clouds, and data centers. Utilizes...
  • 9
    Quantum Xchange

    Quantum Xchange

    Quantum Xchange

    Quantum Xchange is an industry leader in providing advanced cryptographic management solutions designed to safeguard data in motion against current and emerging cybersecurity threats, including those posed by quantum computing advancements. Their comprehensive platform addresses single points of failure in encryption, ensuring robust data security today and quantum-safe protection for the future. A key offering from Quantum Xchange is CipherInsights, a tool that enables organizations to...
  • 10
    IBM Guardium Quantum Safe
    IBM Guardium Quantum Safe, delivered on the IBM Guardium Data Security Center, monitors, uncovers, and prioritizes cryptographic vulnerabilities to help protect your data from both conventional and quantum-enabled risks. As quantum computing advances, traditional encryption algorithms that would take centuries to break using conventional computers may be cracked within hours, potentially leaving all sensitive information secured by today's encryption standards vulnerable. IBM, a leader in...
  • 11
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and...
    Starting Price: $1.25 per month
  • 12
    Crypto Chain Wire

    Crypto Chain Wire

    Crypto Chain Wire

    Crypto press release distribution is an essential component of any content marketing strategy. Crypto Chain Wire is a High-Grade Crypto Press Release Dissemination Platform, providing updated news regarding the environment of cryptography to pertinent audiences. It's a powerful way to get your message out to the world and reach a wide audience. When done correctly, press releases can be effective in driving traffic, generating leads and creating brand awareness. In the ever-competitive crypto industry, having a steady stream of press releases is key to remaining competitive and successful.
  • 13
    AVX ONE

    AVX ONE

    AppViewX

    ...With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 14
    Inkrypt AI

    Inkrypt AI

    Inkrypt AI

    ...Inkrypt.ai provides end-to-end encryption across the data lifecycle, including key generation, secure storage, rotation, and access control. Its hybrid cryptographic architecture aligns with NIST post-quantum cryptography guidance, allowing enterprises to prepare for future quantum threats without disrupting existing systems. The platform includes a web-based administration and analytics console, real-time telemetry pipelines, centralized audit logging, and policy-driven access controls. Automated key rotation, zero-downtime cryptographic operations, and real-time se
  • 15
    QSE

    QSE

    QSE Group

    QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy...
    Starting Price: $19.90/month
  • 16
    Ergo

    Ergo

    Ergo Platform

    Ergo builds advanced cryptographic features and radically new DeFi functionality on the rock-solid foundations laid by a decade of blockchain theory and development. Ergo draws on ten years of blockchain development, complementing tried and tested principles with the best peer-reviewed academic research into cryptography, consensus models and digital currencies. We start with solid blockchain basics and implement new and powerful cryptography natively. Our team has a solid background in core development with cryptocurrencies and blockchain frameworks including Nxt, Scorex and Waves, and our lean approach means we can prioritise new features and requirements quickly.
  • 17
    OpenBSD

    OpenBSD

    OpenBSD

    ...The project's development environment and developer events are funded through contributions collected by The OpenBSD Foundation. Contributions ensure that OpenBSD will remain a vibrant and free operating system. Hence the OpenBSD project has embedded cryptography into numerous places in the operating system. We require that the cryptographic software we use be freely available and with good licenses. We do not directly use cryptography with nasty patents. We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country. ...
    Starting Price: Free
  • 18
    Cellframe

    Cellframe

    Cellframe

    ...We believe that the next paradigm for blockchain technology is mass adoption and our platform strives to expand the use cases associated with blockchain technology. Cellframe can provide extremely high transaction throughput based on the original sharding implementation. In addition, Post-quantum cryptography makes the system resistant to hacking by quantum computers, which are not far off. Based on the original sharding implementation, Cellframe can provide extremely high transaction throughput.
  • 19
    TYCHON

    TYCHON

    TYCHON

    Tychon is an advanced endpoint analytics and remediation platform designed to provide comprehensive visibility and control over enterprise endpoints. It enables organizations to search, visualize, remediate, and monitor security compliance across all endpoints within a unified interface. Key features include real-time monitoring, historical data tracking, and rapid query capabilities, allowing for instant identification of threats and vulnerabilities. It offers dynamic dashboards that...
  • 20
    OpaqueVEIL
    ...The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 21
    UBIRCH

    UBIRCH

    UBIRCH

    UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. ...
  • 22
    Analog

    Analog

    Analog

    ...Participation in securing the network is open to anyone who has attained a ranking score and staked some $ANLOG tokens. Analog Network derives its security from threshold cryptography, novel consensus protocol, and validator observers (sentinels) — with validator security rules, rigorous audits, and bug bounties. You can customize your dApp’s security settings, such as the number of chronicle workers participating in threshold cryptography, as needed. Analog Network provides a unified API — called the Watch API — that brings visibility to data from any connected blockchain through an intuitive and easy-to-use interface. ...
  • 23
    Quantum-Safe Platform
    Post-Quantum's Quantum-Safe Platform is a modular cybersecurity suite designed to protect organizations from the emerging risks of quantum computing. It offers interoperable, backward-compatible, and crypto-agile solutions that ensure a seamless transition to next-generation encryption. A quantum-ready, multi-factor biometric authentication system enabling secure passwordless sign-ins. Quantum-safe VPN that secures data-in-transit against both traditional and quantum attacks. The world's...
  • 24
    Akeyless Identity Security Platform
    ...It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. ...
  • 25
    CSRNG

    CSRNG

    CSRNG

    ...Easy to use, well documented, fast and convenient, CSRNG Lite provides you with a NIST-certified random number generator that can provide your applications with the random numbers you need, be it for gambling apps, cryptography, secure codes, research, statistics, academics, and anywhere random numbers are needed. You can change the min and max values in the queried URL to change the scope of the number generator. For more intensive, live websites and custom needs, we offer a customizable API to which you can subscribe. All the CSRNG professional features, plus the possibility to store your random number requests for later use. ...
    Starting Price: $7 per month
  • 26
    IDEMIA

    IDEMIA

    IDEMIA

    ...Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. And while connections and transactions are increasingly streamlined and seemingly effortless, we tap into cryptography expertise and leadership to ensure they are safe.
    Starting Price: Free
  • 27
    Entrust Cryptographic Security Platform
    The Entrust Cryptographic Security Platform is a unified, end-to-end solution designed to manage cryptographic assets, including keys, secrets, and certificates, across diverse enterprise environments. It offers centralized visibility through a unified dashboard, enabling organizations to monitor cryptographic assets, audit changes, and receive alerts for enhanced security oversight. It supports scalable deployment with high-performance cryptographic solutions, ensuring compliance with...
  • 28
    SIGNiX

    SIGNiX

    SIGNiX

    ...SIGNiX also offers MyDoX, a standalone digital signature solution for resellers and vendors. In both cases, complex cryptography and enhanced security measures are completely abstracted from the user’s view, providing a simple, friendly user experience.
    Starting Price: $120/yr
  • 29
    Cosmian

    Cosmian

    Cosmian

    Cosmian’s Data Protection Suite delivers a comprehensive, next-generation cryptography platform to secure sensitive data and applications in use, at rest, and in motion across cloud and edge environments. It includes Cosmian Covercrypt, a high-performance hybrid classical and post-quantum encryption library with traceable, fine-grained access control; Cosmian KMS, an open-source, centralized key management system that enables massive client-side encryption on the fly; and Cosmian VM, a plug-and-play, verifiable confidential virtual machine that continuously cryptographically verifies its own integrity without disrupting existing workflows. ...
  • 30
    xtendr

    xtendr

    xtendr

    xtendr unhides detailed, privacy-preserving insights across multiple independent data sources. xtendr enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. xtendr is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next