Alternatives to ESCRYPT

Compare ESCRYPT alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ESCRYPT in 2024. Compare features, ratings, user reviews, pricing, and more from ESCRYPT competitors and alternatives in order to make an informed decision for your business.

  • 1
    Beyond Identity

    Beyond Identity

    Beyond Identity

    Beyond Identity is fundamentally changing the way the world logs in–eliminating passwords and all phishable factors to provide users with the most secure and frictionless authentication on the planet. Our invisible, passwordless MFA platform enables companies to secure access to applications and critical data, stop ransomware and account takeover attacks, meet compliance requirements, and dramatically improve the user experience and conversion rates. Our revolutionary zero-trust approach to authentication cryptographically binds the user’s identity to their device, and continuously analyzes hundreds of risk signals for risk-based authentication.
    Starting Price: $0/ User/ Month
  • 2
    Assembly Voting

    Assembly Voting

    Assembly Voting

    Unlock the potential of secure, verifiable, and user-friendly elections and votes with Assembly Voting. Backed by over 20 years of experience, conducting more than 7000 elections, and serving over 43 million voters, we specialize in secure voting through top-tier encryption, accessible platforms with user-friendly interfaces, and verifiable results with transparent processes. Our customizable solutions adapt to various organizational needs, from governmental elections to corporate voting processes. Leveraging scientific research and cryptographic protocols, our end-to-end verifiable technology empowers clients to conduct trustworthy elections using a secure system.
    Starting Price: $1500
  • 3
    Azure RTOS

    Azure RTOS

    Microsoft

    Azure RTOS is an embedded development suite including a small but powerful operating system that provides reliable, ultra-fast performance for resource-constrained devices. It’s easy-to-use and market-proven, having been deployed on more than 10 billion devices worldwide. Azure RTOS supports the most popular 32-bit microcontrollers and embedded development tools, so you can make the most of your team’s existing skills. Easily connect to cloud and local networks, develop durable flash file systems, and design elegant user interfaces. Code that has been certified to meet stringent industry safety and security standards. Clean, clear code is easier to use and maintain and can lower total cost of ownership. Most safety-related certifications require you to submit the complete source code for your software, including the RTOS.
  • 4
    EEZ Studio

    EEZ Studio

    Envox d.o.o.

    EEZ Studio represents a unique solution when both rapid development of an attractive GUI and remote control of devices for test and measurement (T&M) automation is required. Created by a team with first-hand experience in designing resource-constrained complex embedded devices, EEZ Studio enables the design of responsive desktops and embedded GUIs using the “drag & drop” and flowcharting (EEZ Flow) visual programming. A series of in-house developed Widgets and Actions as well as LVGL support and read-to-go project templates and examples enable rapid prototyping as well as development of final applications. The EEZ Studio contains everything you need to quickly create, test and debug attractive and responsive GUIs, regardless of the level of complexity, and can meet even the most complex requirements. Depending on the type of application, several types of projects are offered in order to simplify development and successfully address the challenges of the chosen target platform.
  • 5
    Peer Mountain

    Peer Mountain

    Peer Mountain

    Peer Mountain goes beyond providing users with ownership and control over their cryptographically secure identities. It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability.
  • 6
    Atonomi

    Atonomi

    Atonomi

    Atonomi is the creator of the universal trust environment for IoT. Atonomi is designed to validate immutable device identity, as well as enable device interoperability and reputation for a connected world. Through the application of blockchain technology, Atonomi aims to make it possible for IoT solutions to build upon it to enable secure IoT transactions. Atonomi’s parent company, CENTRI Technology, is a leading provider of IoT data security for resource-constrained devices. Developers and manufacturers can embed the Atonomi SDK onto their IoT devices, giving them the ability to leverage the power of blockchain technology and the Atonomi trust environment. Atonomi accomplishes all of this with precision coding that keeps its embedded SDK footprint to a mere 50 Kb for most devices. Because we know that before you can secure IoT devices, you must provide a solution that can fit onto—and operate within the severe resource constraints of—IoT devices.
  • 7
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
    Starting Price: Free
  • 8
    ITTIA DB
    The ITTIA DB product family combines the best of time series, real-time data streaming, and analytics for embedded systems to reduce development time and costs. ITTIA DB IoT is a small-footprint embedded database for real-time resource-constrained 32-bit microcontrollers (MCUs), and ITTIA DB SQL is a high-performance time-series embedded database for single or multicore microprocessors (MPUs). Both ITTIA DB products enable devices to monitor, process, and store real-time data. ITTIA DB products are also built for the automotive industry Electronic Control Units (ECUs). ITTIA DB data security protocols offer data protection against malicious access with encryption, authentication, and DB SEAL. ITTIA SDL is conformant to the principles of IEC/ISO 62443. Embed ITTIA DB to collect, process, and enrich incoming real-time data streams in a purpose-built SDK for edge devices. Search, filter, join, and aggregate at the edge.
  • 9
    CertifyMe

    CertifyMe

    CertifyMe

    CertifyMe helps trainers, teachers, event marketers, and HR professionals award cryptographic digital certificates and badges with just a couple of clicks. Our systems are built keeping a security-first mindset. Our encryption algorithms and access/ authentication techniques are state-of-the-art to ensure maximum security and privacy for your credentials. Our immutable crypto credentials use advanced technologies like the AWS Quantum ledgers to ensure your credentials are secure. Our 40+ feature set also includes advanced options like cryptographic signatures based on RSA SHA-1, Id tagging, barcodes, and Qrcode to name a few. Stand out, and deploy your own digital credential platform in your domain using our white-labeled solutions starting at $50. Your credential systems would run on our dedicated servers ensuring a high level of security & customizability. We also provide API and Zapier integration.
    Starting Price: $15 per month
  • 10
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 11
    OpenBSD

    OpenBSD

    OpenBSD

    OpenBSD is developed entirely by volunteers. The project's development environment and developer events are funded through contributions collected by The OpenBSD Foundation. Contributions ensure that OpenBSD will remain a vibrant and free operating system. Hence the OpenBSD project has embedded cryptography into numerous places in the operating system. We require that the cryptographic software we use be freely available and with good licenses. We do not directly use cryptography with nasty patents. We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country. Be as politics-free as possible; solutions should be decided on the basis of technical merit.
    Starting Price: Free
  • 12
    WinMagic SecureDoc
    SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).
  • 13
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 14
    Azure Confidential Ledger
    Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence. Azure confidential ledger provides a managed and decentralized ledger for data entries backed by blockchain. Protect your data at rest, in transit, and in use with hardware-backed secure enclaves used in Azure confidential computing. Ensure that your sensitive data records remain intact over time. The decentralized blockchain structure uses consensus-based replicas and cryptographically signed blocks to make information committed to Confidential Ledger tamperproof in perpetuity. You’ll soon have the option to add multiple parties to collaborate on decentralized ledger activities with the consortium concept, a key feature in blockchain solutions. Trust that your stored data is immutable by verifying it yourself. Tamper evidence can be demonstrated for server nodes, the blocks stored on the ledger, and all user transactions.
    Starting Price: $0.365 per hour per instance
  • 15
    Epicor CMS
    The automotive industry demands precision and efficiency from their manufacturing and delivery systems. Epicor CMS is a purpose-built ERP solution for automotive manufacturers, with tools and controls that meet the strict delivery requirements and rigorous production deadlines that your customers demand. Reduce shipping errors and tighten inventory accuracy with serialized inventory tracking. Meet ever-changing customer labeling and compliance requirements with world-class automotive EDI. Embedded MES collects data from machines to automatically provide essential production data. Also called license plating, serialization greatly improves inventory accuracy, visibility, and traceability. Visualize if a process is functioning normally and take action to avoid problems before they start. React quickly to changing customer demands and meet your customers’ unique labelling requirements. Automatically replenish inventory based on stock level or manual requests directly from operators.
  • 16
    QANplatform

    QANplatform

    QANplatform

    Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 17
    Veridify

    Veridify

    Veridify Security

    Veridify is recognized as a leader in security for small computing platforms and has presented at several industry events. We have assembled an experienced team of mathematician-cryptographers, developers, engineers, security leaders and technology executives. Our development team has transformed the research done under grants from the National Science Foundation and the US Air Force to a line of products that incorporate security for small computing platforms. Veridify was recognized by The Security Innovation Network (SINET) for delivering the most advanced anti-counterfeiting solutions for high-value products in both the commercial and defense sectors. The “SINET 16” winners, chosen from nearly 200 entries worldwide, are “best-of-class” security companies addressing industry and government’s most pressing needs and requirements. SINET is an organization focused on advancing cybersecurity innovation through public-private collaboration with the US Department of Homeland Security.
  • 18
    Seemplicity

    Seemplicity

    Seemplicity

    The fundamentals of workplace productivity have been redefined with automated workflows in nearly all domains. But what about security? When it comes to driving risk down, security teams are forced to play air traffic controller, deduplicating, sorting, and prioritizing every security finding that comes in, then routing and following up with developers all across the organization to make sure problems get fixed. The result, is a massive administrative burden on an already resource-constrained team, stubbornly long time-to-remediation, friction between security and development, and an inability to scale. Seemplicity revolutionizes the way security teams work by automating, optimizing, and scaling all risk reduction workflows in one workspace. Aggregated findings with the same solution on the same resource. Exceptions, such as rejected tickets or tickets with a fixed status but an open finding, are automatically redirected to the security team for review.
  • 19
    Arctic Wallet

    Arctic Wallet

    Arctic Wallet

    Meet Arctic: a non-custodial crypto wallet that does not collect or share user data. The project was created and developed by professionals with more than 10 years of experience in the field of cryptocurrency. When designing the wallet, the Arctic team meant to address the issues users face on a regular basis, as well as in the near future to make it a guiding resource for newcomers to the exciting world of crypto. To make it happen, the design is guided by three principles. First — all work with cryptographic algorithms and handling of sensitive data happens in a secure process. Second — the intended experience is all about data security and anonymity of users, as well as fast and secure transactions. Third — feedback from project users is crucial when making changes to the wallet functionality. So far the wallet supports over 170 of the most popular cryptocurrencies and tokens, and their number will increase every week.
  • 20
    PlatON

    PlatON

    PlatON

    Combining blockchain and privacy-preserving computation technologies, PlatON is building a decentralized and collaborative AI network and global brain to drive the democratization of AI for safe artificial general intelligence. PlatON, initiated and driven by the LatticeX Foundation, is a next-generation Internet infrastructure protocol based on the fundamental properties of blockchain and supported by the privacy-preserving computation network. “Computing interoperability” is its core feature. By building a computing system assembled by verifiable computation, secure multi-party computation, zero-knowledge proof, homomorphic encryption and other cryptographic algorithms and blockchain technology, PlatON provides a public infrastructure in open source architecture for global artificial intelligence, distributed application developers, data providers and various organizations, communities and individuals with computing needs.
  • 21
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 22
    Actian Zen
    Actian Zen is an embedded, high-performance, and low-maintenance database management system designed for edge applications, mobile devices, and IoT environments. It offers a seamless integration of SQL and NoSQL data models, providing flexibility for developers working with structured and unstructured data. Actian Zen is known for its small footprint, scalability, and high reliability, making it ideal for resource-constrained environments where consistent performance and minimal administrative overhead are essential. With built-in security features and a self-tuning architecture, it supports real-time data processing and analytics without the need for constant monitoring or maintenance. Actian Zen is widely used in industries like healthcare, retail, and manufacturing, where edge computing and distributed data environments are critical for business operations.
  • 23
    MetaCompliance Security Awareness Training
    Easily automate Security Awareness Training, phishing and policies in minutes. As cybercriminals become increasingly sophisticated, cyber attacks are no longer a matter of if, but when. The challenge is that planning an effective security awareness campaign takes time and resource. Many resource-constrained organizations often struggle to provide even basic Security Awareness Training for their workforce, let alone develop a security awareness program that drives behavior change. Automated Security Awareness Training provides an engaging learning experience for end users, all year round, to ensure cyber security threats stay top of mind. MetaCompliance’s automated security awareness solution enables organizations to schedule their Security Awareness Training for the entire year and mitigate the risk of human-born error. Using a “set it and forget it” approach, automation of security training allows CISOs to save time and resources.
  • 24
    cryptography

    cryptography

    cryptography

    cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices. These are safe and easy to use and don’t require developers to make many decisions. The other level is low-level cryptographic primitives. These are often dangerous and can be used incorrectly. They require making decisions and having an in-depth knowledge of the cryptographic concepts at work. Because of the potential danger in working at this level, this is referred to as the “hazardous materials” or “hazmat” layer. These live in the cryptography.hazmat package, and their documentation will always contain an admonition at the top.
  • 25
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
    Starting Price: Free
  • 26
    GoTrace

    GoTrace

    Chainparency

    The world’s first true, turnkey SaaS solution for the recording, tracking, and tracing of physical items on an immutable blockchain ledger. Regardless of size or budget, any organization can easily deploy GoTrace to track and trace any asset globally and offer real-time auditability of transactions based on a single source of truth, a public blockchain ledger. With a smartphone and access to a printer, users are able to quickly launch a blockchain traceability solution in minutes. Real-time audibility and recording of transactions on a cryptographically secure, immutable public blockchain ledger. Receive timely insights and alerts on tracked assets as well as geofenced locations within your supply chain. Easily generate and share traceability reports on a real-time basis. Ability to integrate with any logistics, transportation, data collection, and other technology solution providers.
  • 27
    Tanker

    Tanker

    Tanker

    Tanker is the most reliable way to secure sensitive data. Build trust with your users by integrating our end-to-end encryption platform in your application. Ensure your clients that no one gets access to their data; we can help you communicate it effectively. Even if your application gets attacked, none of the encrypted data will be readable. Tanker is a privacy-by-design solution, fitting with global regulations. We already protect over 30M users and encrypted over 1 bln pieces of data. We quickly adapt to your growth. No changes in your application UX are required. Your end-users won't notice the difference, but their sensitive data will. The platform can be integrated within three weeks with no cryptographic skills. We provide high-quality tutorials and reference documents. We offer several security options so our clients can choose what types of data they want to encrypt and how. We adjust to your needs.
  • 28
    Airside

    Airside

    Airside

    Helping businesses and individuals verify, share, and manage personal information, including COVID lab results. With digital ID, people want convenience and privacy, and organizations want access and ease. We believe both are possible. Mobile Passport was just the beginning. The Airside Digital Identity Network leverages technology trusted by the U.S. government and loved by millions of people. Data is encrypted on the user’s mobile device and cryptographic keys enable consent-driven, time-bound sharing, negating the need for local storage.” ID verification from government sources and COVID-19 health results from over 20,000 FDA-approved lab locations ensure the authenticity of user data. Safe, reliable, and cost-efficient biometric matching easily integrate into legacy systems to confirm identities and provide streamlined, touchless experiences. Make customer onboarding, KYC and AML checks, and servicing secure and more efficient.
  • 29
    Antimatter

    Antimatter

    Antimatter

    Customers insist on control over where their data resides, and who has access to it, every step of the way. Duplicating infrastructure and rewriting applications to address these requirements is costly and a huge burden on your developer & DevOps teams. Cryptographically meet customer requirements without changing your infrastructure or code. Provide your customers with provable guarantees of where their data can be accessed and by whom. Antimatter slides under your unmodified containers and works in all major clouds – so no engineering lift. It uses secure enclaves, available on all major clouds, to transparently encrypt all customer data – in transit, at rest, and even during execution. Meet customers residency, governance, & tenancy requirements easily. Accelerate sales, enter new markets, and close deals that were not possible before. We believe in a future where companies and people retain control over their own data no matter where it is, in any application.
  • 30
    µ-visor

    µ-visor

    Green Hills Software

    µ-visor is Green Hill Software’s virtualization solution for microcontrollers. It features robust hardware-enforced software separation, multiple-OS support and real-time efficiency to safely and securely consolidate critical workloads on resource-constrained processors. µ-visor’s scalable and efficient architecture guarantees freedom-from-interference to multiple operating systems running on the same CPU and offers flexible options to fully utilize multiple cores and limited processor resources. Like other Green Hills products, µ-visor is designed for systems with critical requirements for industry-specific safety and security certifications and it enjoys the powerful support of Green Hills’ advanced integrated development tools. µ-visor’s virtual machines and their operating systems enjoy freedom-from-interference from each other through hardware-enforced separation
  • 31
    Artizcoin

    Artizcoin

    Artizcoin

    At Artizcoin, we have created an evolved protocol that protects and tokenizes intellectual property in the NFT economy. Our solution provides the necessary security, scalability, and flexibility for today's digital creators. Artizcoin is revolutionizing the way intellectual property is protected and valued in the virtual world. Artizyou was born in 2019 as a solution to the violation of virtual intellectual property rights and the lack of clear legal protection for our data on the web. We recognize the need to make intellectual property law more accessible to fellow creatives. Artizyou has dedicated over 5 years to research and development, resulting in the creation of cryptographic and data monitoring technologies. These technologies utilize the power of blockchain to generate time-stamped certificates, ensuring the authenticity and security of intellectual property. We developed an AI plagiarism detector that alerts creatives whenever their work is online without authorization.
  • 32
    Codenotary

    Codenotary

    Codenotary

    We bring trust and integrity into the software life cycle by providing end-to-end cryptographically verifiable tracking and provenance for all artifacts, actions, and dependencies, at scale. Based on open source immudb, our highspeed, immutable store. Ultra-fast and simple integration with all your existing languages and CI/CD. Codenotary Cloud enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. With Codenotary Cloud® you can easily build immutable, tamper-proof solutions and comply with auditor requirements and regulations and laws. Codenotary Trustcenter enables any company, developer, automation engineer, DevOps engineer to secure all stages of a CI/CD pipeline. Attestation (Notarization & Authentication) of every step in your pipeline including vulnerability scanner results and evidence in a tamper-proof and immutable service enables you to reach Level 3 & 4 of the SLSA (Supply-chain Levels for Software Artifacts).
  • 33
    OpaqueVEIL
    CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 34
    Eclypsium

    Eclypsium

    Eclypsium

    Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices.
  • 35
    Quantum Origin

    Quantum Origin

    Quantinuum

    Experience the world’s only quantum-computing-hardened encryption keys, ensuring provably superior protection and allowing you to seamlessly strengthen your existing cybersecurity systems for enhanced security today, and into the future. Every organization owns sensitive data that must be kept secret at all costs. Quantum Origin adds unmatched cryptographic strength to existing cybersecurity systems, giving your enterprise a long-term edge against cyber criminals. Maintaining the trust of customers, shareholders, and regulators means adapting and strengthening your cybersecurity foundations. Adopting Quantum Origin showcases your commitment to staying ahead of potential threats. Quantum Origin verifiably strengthens the cryptographic protection around your technology and services, proving you take the privacy and security of your customer's data as seriously as they do. Let your customers know their data is safe with the ultimate in cryptographic protection.
  • 36
    Mirantis Secure Registry
    Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls.
  • 37
    SEcureMetrics

    SEcureMetrics

    StoneEagle

    SEcureMetrics F&I is the most comprehensive and user-friendly reporting solution in the retail automotive industry. Leveraging Certified DMS integration, SEcureMetrics F&I provides instant access to overall dealership performance. SEcureAdmin is a powerful Cloud-based F&I Product Administration Platform designed for growth and maximum performance, and supports all types of F&I product lines. This cloud-based platform manages all aspects of F&I product administration, from automotive to watercraft, and reduces your operational costs. SEcureMetrics F&I is the most comprehensive and user-friendly reporting solution in the retail automotive industry. Leveraging Certified DMS integration, SEcureMetrics F&I provides instant access to overall dealership performance. SEcureMenu provides a fast, flexible and user-friendly sales presentation. The simplified user interface and intuitive workflow make the process easy on the Finance Manager.
    Starting Price: $150.00/month
  • 38
    QNX Neutrino RTOS
    Since 1980, thousands of companies have deployed QNX’s real-time operating systems to ensure the ideal combination of performance, security and reliability in mission-critical systems. At the core of QNX technology is the QNX Neutrino® Real-time Operating System (RTOS), a full-featured RTOS enabling next-generation products in every industry where reliability matters, including automotive, medical devices, robotics, transportation, and industrial embedded systems. With the QNX microkernel architecture, a component failure doesn’t bring down other components or the kernel. The failed component is simply shut down and restarted without adversely affecting the rest of the system. The QNX Neutrino RTOS offers the determinism only a real-time OS can provide. Techniques such as adaptive partitioning guarantee critical processes get the cycles they need to complete their tasks on time, while maintaining the performance your complex embedded systems require.
  • 39
    CYTRIO

    CYTRIO

    CYTRIO

    Automatically discover PI data across cloud and on-premises data stores and correlate with customer identity. Orchestrate data subject access requests (DSAR) and build customer trust. Enable customers to exercise data privacy rights with a secure, customizable privacy portal. Easily answer the critical who, what, why, and where questions about your PI data. Automated workflows for data, security, and privacy teams. Meet auditor obligations with detailed DSAR lifecycle history. Customizable and brandable privacy center. Secure communication and data download. Get up and running in minutes, no professional services required. Ideal for resource-constrained organizations. Data discovery, classification and ID correlation.
    Starting Price: $499 per month
  • 40
    Chainparency

    Chainparency

    Chainparency

    The use of blockchain technology, particularly via an asset tokenization process, can help unlock value and provide unparalleled transparency for global commerce, finance, and supply chains. Issuance of blockchain-based tokens can function as digital twins of real-world tangible and intangible assets. The use of blockchain-based tokens along with digital wallets ultimately ensures that any asset sale or transference of ownership can be easily verified, immutably recorded, and real-time auditable via a cryptographically secure, distributed public ledger. All transactions are recorded on an immutable blockchain ledger. Transactions and real-time processed and recording. The blockchain becomes the single source of truth among all stakeholders. Blockchain-authenticated transactions are cryptographically secure and irreversible resulting in the generation of high-fidelity data. Blockchain-based wallets provide multi-factor authentication and cryptographically-secure digital methods.
  • 41
    Otonomo

    Otonomo

    Otonomo

    The Otonomo Platform provides secure data management and gives drivers granular controls over how their personal automotive data is shared. Patented technology performs data blurring for use cases requiring blurred data. Many mobility services can’t operate well without data from multiple automotive manufacturers (OEMs). Yet individual OEMs lack incentives to consolidate each others’ data. As a neutral third party, Otonomo aligns OEMs and the multitude of valuable apps and services that use car data. Third-party apps and services gain easy data access, while OEMs maintain control over which services can access their data. Our platform uses patented technology to cleanse, normalize, and enrich automotive data so that it is immediately usable by our ecosystem partners. We build enriched datasets that incorporate third-party sources and aggregated events and metrics for key use cases to save time and cost in development processes.
  • 42
    Yana Automotive Solution

    Yana Automotive Solution

    Technosoft Automotive

    Technosoft Automotive, established in 2012, rated as one of the Premier Microsoft Dynamics Global ISV solution providers. We provide a wide range of automotive solutions, from distribution, Dealer Management Systems (DMS) to Customer Relationship Management (CRM). Our flagship product is Yana Automotive Solution for automotive OEMs, distributors, and dealers, supporting approximately 1.4K dealers, 33K combined users, 205K vehicle orders, and 1.1M repair orders.
  • 43
    SandboxAQ

    SandboxAQ

    SandboxAQ

    The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches.
  • 44
    Kanzi

    Kanzi

    Rightware

    Kanzi enables the rapid design and development of user interfaces (UIs) for the automotive industry and other embedded applications. Kanzi UI design software provides designers with visual tools for creating high-fidelity branded UIs. With its agile workflow and modular architecture Kanzi accelerates UI design by allowing designers and engineers to work independently and in parallel without disruptions. Kanzi provides car manufacturers, Tier 1 companies and design studios with an efficient and agile approach for creating UIs for digital instrument clusters, infotainment systems, HUDs and more. Real-time UI editor with Live Preview. Designer-oriented visual tools for UI creation no coding required. Compatible with leading 2D and 3D file formats, seamless 2D and 3D composition, built-in library of UI components and layouts. With Kanzi designers and engineers are free to work independently and in parallel, decreasing development time while accelerating iteration cycles.
  • 45
    HINAI Web

    HINAI Web

    ICT Health Technology Services India

    HIN+AI is a mobile-first, intelligent #HealthIT platform conceived around a blockchain EHR, an XDS compatible clinical content manager, cloud-deployed multiple-tenant PAS & practice management with ad hoc data query & analysis capabilities. The first release of HIN+AI features clinical decision support, intelligent alerts/ scheduler with embedded CPOE & results viewer that make it a powerful e-medicine workstation housing your private data securely on your smartphones, tablets, or desktops. Deep learning is all about identifying patterns by connecting the dots. HIN+AI uses deep learning approaches to translate extensive EHR data to gain knowledge and provide actionable insight. Blockchain-enabled HIN+AI supports health data interoperability, integrity, and security, portable user-owned data through data exchange systems that are cryptographically secured and irrevocable. Information coming from wearable health trackers and sensors could be analyzed together.
  • 46
    TASKING

    TASKING

    TASKING

    The quality of your code is valued by its efficiency and ability to execute flawlessly. Is your current development environment providing you with the tools you need to create clean, efficient, and correct code? You’re responsible for developing solutions that impact human longevity and safety, and the last thing you can afford to compromise on is your integrated development environment. The TASKING Embedded Software Development solutions provide an industry-leading ecosystem for your entire software development process. Each TASKING compiler is developed for a specific architecture and meets the unique needs of your specialized industry requirements including automotive, industrial, telecom, and datacom. A complete integrated development environment allows you to create error-free and efficient code with compilers, debuggers, embedded internet, and RTOS support for industry-leading microprocessors and microcontrollers.
  • 47
    Codebeamer

    Codebeamer

    Intland Software

    Codebeamer is an Application Lifecycle Management (ALM) platform for advanced product and software development. The open platform extends ALM functionalities with product line configuration capabilities and provides unique configurability for complex processes. Empower product teams in industrial manufacturing and automotive engineering. Optimize the delivery of complex automotive technology and industrial manufacturing products. Codebeamer is a complete lifecycle management solution with all-in-one requirements, risk, and test management capabilities.
    Starting Price: $102 per user per month
  • 48
    Tellor

    Tellor

    Tellor

    A decentralized oracle network. Tellor is a permissionless community of token holders, data providers, and validators. Together, we cryptographically secure putting real world data on-chain. It takes 3 lines of code to integrate with Tellor for reliable, trustless data in your smart contracts.
  • 49
    ARGUS

    ARGUS

    Argus Cyber Security

    Connected vehicles now outpace the growth in both mobile phones and tablets. While connectivity can increase road safety and improve the transit experience, the more vehicles become connected, the more vulnerable they are to cyber attacks. No longer the realm of science fiction, recent events have shown that cyber threats transcend vehicle make and model to include all cars and commercial vehicles equipped with embedded or aftermarket connectivity. Given the potential for physical harm to motorists, passengers and property in case of a breach, Argus’ mission is to maintain road safety and to prevent costly vehicle recalls. Today, motorists, truckers and fleet operators expect advanced services without giving up their safety, security or competitiveness. Argus, the global leader in automotive cyber security, provides comprehensive and proven solution suites to protect connected cars and commercial vehicles against cyber-attacks.
  • 50
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01