[go: up one dir, main page]

Suggested Categories:

Post-Quantum Cryptography (PQC) Software
Post-quantum cryptography (PQC) software refers to cryptographic systems and algorithms designed to secure data against the potential future threat posed by quantum computers. Traditional cryptographic methods, such as RSA and ECC (Elliptic Curve Cryptography), rely on the difficulty of certain mathematical problems that could be solved efficiently by a sufficiently powerful quantum computer. Post-quantum cryptography focuses on developing new cryptographic protocols that are resistant to quantum computing threats, utilizing algorithms based on lattice-based, hash-based, multivariate, or code-based cryptography. This software ensures that data remains secure even in the era of quantum computing, offering a bridge between today's cryptographic practices and the future landscape of quantum-enhanced threats.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Collaboration Software
Collaboration software is software to help teams, organizations, and individuals work together more efficiently, regardless of their physical location. These tools facilitate communication, file sharing, project management, and real-time collaboration, allowing users to work on documents, track tasks, and share information seamlessly. Collaboration software often includes features like messaging, video conferencing, shared workspaces, document collaboration, and workflow management. It is widely used in business environments to enhance productivity, improve teamwork, and streamline processes, especially for remote or distributed teams.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
File Sharing Software
File sharing software is software that enables users to securely share and exchange files and data over the internet. It allows people to easily store, access, and transfer documents, files, photos, videos, music, and other types of data to and from multiple devices. There are many popular file sharing programs available for both home networks and business use. These provide features such as file synchronization across multiple devices, security protocols for protection against malicious activity/hacking attempts, cloud-based storage capabilities, etc.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
View more categories (6) for "cryptography"

6 Products for "cryptography" with 2 filters applied:

  • 1
    Keybase

    Keybase

    Zoom Communications

    End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. ...
  • 2
    Progress WS_FTP

    Progress WS_FTP

    Progress Software

    ...It provides SFTP transfers with the highest levels of encryption, is easy to use and customize, and reduces administrative burden. Protect files before, during, and after transfer with 256-bit AES, FIPS 140-2 validated cryptography and OpenPGP file encryption. Use SFTP to authenticate and connect to servers that require SSH clients that respond to server-defined prompts for authentication, in addition to username. Easily locate and transfer files using integrated Google™, Copernic™ or Windows® desktop search engines. Search by parameters such as file type, size, and date. ...
    Starting Price: $29.95/one-time
  • 3
    BeSafe

    BeSafe

    BeSafe

    ...Find out what matters most with instant “read” notifications and even page-by-page view analytics. We are revolutionizing end-to-end encrypted cloud collaboration with Proxy Re-Encryption cryptography. Besafe uses patent pending technology for encrypting your data and enabling secure sharing over any email or cloud file sharing application. BeSafe can be integrated to Dropbox via the user’s BeSafe web portal.
  • 4
    Skiff

    Skiff

    Skiff

    ...Generous free tier - Enjoy 10 GB of free storage for your email, attachments, documents, and notes. - Create up to 4 free email aliases to protect your identity. Open-source and audited - Skiff Mail is open-source, uses open-source cryptography, and undergoes external security audits. - You can access our whitepaper and code at skiff.com. No trackers or ads - Sign up and upgrade without sharing any personal information; use crypto payments in many different currencies to upgrade. - Your data is never collected, sold, or shared.
  • 5
    Pragma Fortress SSH Server

    Pragma Fortress SSH Server

    Pragma Systems Inc

    ...This ensures that your file transfers are protected by best-in-class security. • RFC 6187 compliant and can perform X.509 v3 CAC/PIV smart card access to Cisco routers and switches using RSA or ECC (Elliptic Curve Cryptography) certificates • FIPS 140-2 compliant using Microsoft NIST certificate #4536. SSH technology implemented on Microsoft Crypto built within Windows • SSH shell sessions that can run Microsoft PowerShell, cmd, Unix shells, etc. • Secure file transfer (SFTP/SCP) • Port Forwarding / Tunneling • Fully supports public key, x.509, smart cards, DoD CAC • IPv6
    Starting Price: $799 (unlimited connections)
  • 6
    Blaze Transfer

    Blaze Transfer

    Blaze Transfer

    Blaze Transfer is a secure platform, designed for swift and safe large file transfers. It employs Post-quantum end-to-end encryption, protecting files from threats of quantum and classical computers while ensuring rapid transfers. Key features of Blaze Transfer include Collaborative Workspaces for unlimited file sharing between workspaces, enhancing team and client collaborations. It allows large files transfer of any type, from any location, on any device, removing concerns about...
    Starting Price: €5/user/month
  • Previous
  • You're on page 1
  • Next