Data encryption software for mainframe environments. Supports most common algorithms and data compression. [z/OS, OS/390]
FAQ covering what cryptography is, explanations of terms, tools and techniques used, applications of cryptography and related laws.
Manufacturer of user authentication tokens, including a CESG-certified version for UK Government use.
Designer of software that accelerates public key cryptography.
Accredited laboratory evaluates and certifies security and cryptographic products against Common Criteria, FIPS 140 and INTERAC (SPED).
Transparent encryption of files, folders and emails with an optional USB token. Supports AES, 3DES and Blowfish algorithms.
Develops and markets access-control and encryption systems for desktops, notebooks, PDAs and smartphones.
Computers /
Hacking /
Cryptography
|