Alternatives to SecureKloud

Compare SecureKloud alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SecureKloud in 2024. Compare features, ratings, user reviews, pricing, and more from SecureKloud competitors and alternatives in order to make an informed decision for your business.

  • 1
    Hacken

    Hacken

    Hacken

    Many web applications process sensitive data including user and financial information, making them of enormous interest to malicious attackers. As the complexity of web applications increases, the range of exploitable vulnerabilities will increase. This is why Hacken’s web penetration testing services are so crucial for our clients. We believe that security should be top priority for any kind of business. We provide knowledge and support to help businesses protect themselves. Hacken is delivering cybersecurity services for businesses of any scale and end customers around the world. While blockchains began life to facilitate the development of cryptocurrencies, they are now widely used across businesses for smart contracts, online transaction management, asset record management, and securing critical data. Acting as digital ledgers residing in a distributed infrastructure, they allow the secure storage and structuring of important information in a manner that ensures integrity.
  • 2
    BlockCypher

    BlockCypher

    BlockCypher

    Our architecture allows us to run in multiple data centers for redundancy and low-latency. Simple and easy web APIs (REST) enable developers to build blockchain applications quickly and confidently. Our modular, cloud-optimized architecture is enterprise-grade for scalability, performance and reliability. We maintain a cluster of distributed databases which contain all transactional data for the entire blockchain. We host full-node blockchains for optimal security in validating and relaying transactions.Our focus is to make our customers successful as they build their next-generation blockchain applications. BlockCypher quickly identifies fraud and transactions likely to confirm.
  • 3
    Valid Network

    Valid Network

    Valid Network

    Blockchain and Cryptocurrencies are NOT safe. Malicious hackers and human errors cost billions of dollars a year in fraudulent transactions and lost value. Existing cybersecurity tools cannot deal with Blockchain technology. Valid Network protects Blockchain and Crypto pioneers, enterprises expanding to Blockchain, and the Blockchain ecosystem by offering a holistic and modular security platform for Blockchain. New security requirements are a direct result of technology revolutions. Without a fitting solution, the revolution can’t be completed. Valid Network enables enterprises to innovate with blockchain, faster and safer than before. Establish a blockchain security perimeter and easily enforce compliance across consortium participants, giving your teams the visibility and control they need. The Valid Network blockchain security platform and security service provides full lifecycle security for enterprise blockchains from initial development to active deployment and management.
  • 4
    CYBAVO

    CYBAVO

    CYBAVO

    CYBAVO is a digital asset security company founded by experts and pioneers from the cryptocurrency and security industries with more than 20 years experience in cybersecurity at the highest level. CYBAVO’s mission is to provide the most technologically advanced security to digital asset custodians. Through our expertise in cybersecurity and decentralized technology, we empower blockchain companies with enterprise­-ready cryptocurrency wallet management services, secured with the best technology available. Our robust cryptographic scheme protects your private keys and minimizes the risk of key loss by implementing a shared responsibility model. Any attacker would need to compromise at least three different entities in order to theoretically gain access to your keys. Security is the core foundation of our solution. Our platform is secure on every front, from the operating system and programming language level, all the way up to strong enforcement of our transaction policy.
  • 5
    Huawei Blockchain Service
    Blockchain Service (BCS) is a highly available and secure blockchain platform allowing enterprises and developers to conveniently create, deploy, and manage applications with the superb performance and cost-effectiveness of HUAWEI CLOUD. Built using innovative technologies based on Kubernetes, featuring security, simple configuration, deployment in minutes, and automatic multi-angle E2E O&M. Lower development and deployment costs, pay-per-use convenience, reduced O&M expenditures with unified management, and auto scaling and upgrade/rollback on demand. Multiple efficient consensus algorithms (10,000+ TPS) and flexible switching, dynamic join-in or quitting of multi-role nodes and members, and container-based management. Complete management and isolation of users, keys, and permissions; multi-layer encryption and privacy assurance; and fully demonstrated cyber security infrastructure. Uses decentralized, tamper-proof, shared ledgers to ensure transparency and fairness.
  • 6
    Bitfury

    Bitfury

    Bitfury

    Exonum Enterprise is Bitfury’s premier blockchain-as-a-service solution, designed to help governments and companies integrate blockchain into their operations. Crystal is a web-based software tool that helps financial institutions and law enforcement manage blockchain investigations. An Exonum blockchain can reduce inefficiencies and build security and trust in all sectors including government, healthcare, education, real estate, insurance and retail. Secure storage, easy retrieval and protected access to government documents hinders efficient operations and increases costs for many governments. A blockchain-based system can serve as a verification clearinghouse for these documents by providing public and private proof of the veracity of a document or certification.
  • 7
    PARSIQ

    PARSIQ

    PARSIQ

    Connect blockchain activity to off-chain apps and devices. Monitor and secure DeFi applications. Build custom event triggers and power real-time automations. Create simple triggers that produce notifications for any blockchain transactions, even at scale. Create complex workflows spanning across multiple blockchains and off-chain apps. Add conditional logic, aggregate, format data and much more. Monitor any activity. Easily create automation connections between blockchains and apps with our quick monitoring wizard. For small businesses and personal users PARSIQ keeps Smart-Triggers organized and accessible. Large enterprises are provided with a dedicated infrastruсture and have the ability to fully customize their monitoring applications. PARSIQ provides all necessary delivery transports based on your specific needs, from emails to refrigerator smart-screen notifications.
    Starting Price: $41 per month
  • 8
    Halborn

    Halborn

    Halborn

    Using deep security inspection and the latest offensive security tactics, we work to find critical vulnerabilities in applications before they are exploited. We use hands-on assessment by our team of dedicated ethical hackers to simulate the latest activities and techniques used by threat actors. We pentest everything from web apps to wallets and layer1 blockchains. Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues, errors in the code, or identify security vulnerabilities. We perform both manual analysis and automated testing to make sure your smart contract application or DeFi platform is ready for mainnet. Get your security and development processes automated to save you time and money. Our expertise is in automated scanning, CI/CD Pipeline development, Infrastructure as Code, Cloud Deployment, SAST/DAST integration, and experience to help build an effective DevSecOps culture.
  • 9
    RansomDataProtect
    The optimal and innovative protection of your personal and sensitive data by the blockchain. RansomDataProtect allows for pseudonymizing personal data and sensitive data. Pseudonymization of data is one of the recommendations of the CNIL in terms of compliance with the GDPR rules and the fight against theft and leakage of sensitive data in the context of attacks of the ransomware type. Your data is secure and tamper-proof inside your files thanks to the innovative combination of variable encryption algorithms and a blockchain. The data that is not masked remains accessible to continue working on the documents with several people. RansomDataProtect easily integrates with your files using an add-in (Word, Excel, PowerPoint, Outlook, and Gmail). RansomDataProtect helps you to comply with the issues related to the general regulation on data protection. Remove security vulnerabilities due to password mismanagement within your company.
    Starting Price: €10 per month
  • 10
    Kaspersky Blockchain Security

    Kaspersky Blockchain Security

    Kaspersky Blockchain Security

    Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Its many applications make blockchain technology a key element in establishing business processes that can even be applied in manufacturing. Blockchain technology is present in IoT networks, workflow management systems, cryptocurrencies and many other fields. It is now an essential component and state-of-the-art standard for a whole host of businesses. However, being a security-driven measure, a blockchain itself can be exposed to various risks. Given the fact that blockchains contain sensitive information about the assets and infrastructure of specific users and enterprises, providing comprehensive protection is critically important. Instant reaction to intrusions, identity compromise and security breaches. Neutralize cyberattacks without waiting for them to violate and crash your network.
  • 11
    AIKON

    AIKON

    AIKON

    Secure user Identities on the Blockchain. GDPR & CCPA compliant Identity as a Service that connects businesses & their users to the most important public blockchains - Algorand, EOS, Ethereum and more! Manage any blockchain with one service. AIKON helps connect your business to multiple blockchains in a cost effective manner, and works with your existing technology stack. Seamlessly move your customers onto the blockchain. Login with email, phone or Social login. Companies can sign on user's behalf. Out of the box, API-based solution. Works across chains. Use existing engineers instead of hiring or training new skill sets. All the features to make sure you are GDPR & CCPA compliant for your users. Blockchain based infrastructure to keep access and data secure and separate. Native blockchain accounts made easy. Let your users sign up the way they know how - using familiar social, email or SMS logins.
  • 12
    Consensys Diligence
    Security is critical in the blockchain space. Our comprehensive smart contract audit service helps everyone from startups to enterprises launch and maintain their Ethereum blockchain applications. Our industry-leading suite of blockchain security analysis tools, combined with hands-on review from our veteran smart contract auditors, ensures that your Ethereum application is ready for launch and built to protect users. Auditing your code early in the development lifecycle prevents potentially catastrophic vulnerabilities after launch. Our APIs provide affordable smart contract security options and the peace of mind that your code is fortified. Veteran security auditors manually double-check your code to eliminate spurious results. Our tools integrate into your development environment so you can perform continuous security analysis. Receive a vulnerability report with an executive summary, vulnerability details, and mitigation guidance.
  • 13
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 14
    Redefine

    Redefine

    Redefine

    Powerful firewall solution integrated into a revolutionary proactive risk mitigation system. Our platform is built from the ground up with the DeFi investor in mind. We are pioneering active risk mitigation technology to provide an unprecedented level of DeFi security. The fully automated system, ready to assess new DeFi opportunities within seconds. DeFi platforms offer lucrative returns, but not all have good intentions. Smart contracts and the composable nature of DeFi make it inherently vulnerable. DeFi investing introduces new types of financial risks like impermanent loss and MEV strategies. Risk analytics engine that automates due-diligence of platforms and contracts and quantifies the risk by using on-chain, off-chain and time-based metrics. Know-your-own-transaction solution simulates the transaction in real-time and reflects the risks to the user before signing.
  • 15
    Authlink

    Authlink

    Authlink

    The product’s digital twin captures real-time information across the supply chain providing trusted provenance, insights, and analytics. Authlink onboard brands, manufacturers & certification agencies, enabling them to create a secure digital identity for each of their product items. The secure identity of a product is created by generating a smart Authlink asset with the issuer’s cryptographic signature and linking it permanently with the product via industrial standard tags from QR Code to NFC, Bluetooth, etc. Each product unit provenance and ownership related information gets immutably stored with their respective digital twin creating a trusted journey of the product lifecycle. Authlink smart assets are represented in the form of certificates to provide a user-intuitive medium of managing and exchanging product ownership. Authlink offers a secure dashboard for institutions and brands to create and issue their product/certificate/document directly on Blockchain.
    Starting Price: $49 per month
  • 16
    SlowMist

    SlowMist

    SlowMist

    SlowMist Technology is a company focused on blockchain ecological security. It was established in January 2018 and headquartered in Xiamen. It was created by a team that has more than ten years of first-line cyber security offensive and defensive combat. Team members have created world-class influence Powerful safety engineering. SlowMist Technology is already an international blockchain security head company. It mainly serves many top or well-known projects around the world through "threat discovery to threat defense integrated security solutions tailored to local conditions", including: cryptocurrency exchange, cryptocurrency wallets, smart contracts , the underlying public chain, there are thousands of commercial customers, customers are located in more than a dozen major countries and regions.
  • 17
    TuringCerts

    TuringCerts

    Turing Chain

    Adopted incorruptible, secure, and trustworthy blockchain technology to ensure 100% authenticity for every certificate. HR departments can verify authenticity anytime at anywhere via links shared by students to make personnel screening more convenient and time saving. Let students' learning portfolio be saved properly, and omit the incovenience for doing paper work, additionally, reduce the human cost for preserving data. Import background image and information filed. Send to recepient email automatically.
  • 18
    Truebit

    Truebit

    Truebit

    Truebit is a blockchain enhancement which enables smart contracts to securely perform complex computations in standard programming languages at reduced gas costs. While smart contracts can perform small computations correctly, large computation tasks pose security risks for blockchains. Truebit counteracts this shortcoming via a trustless, retrofitting oracle which correctly performs computational tasks. Any smart contract can issue a computation task to this oracle in the form of WebAssembly bytecode, while anonymous “miners” receive rewards for correctly solving the task. The oracle’s protocol guarantees correctness in two layers: a unanimous consensus layer where anyone can object to faulty solutions, and an on-chain mechanism which incentivizes participation and ensures fair remuneration. These components formally manifest themselves through a combination of novel, off-chain architecture and on-chain smart contracts.
  • 19
    UBIRCH

    UBIRCH

    UBIRCH

    UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source. One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library.
  • 20
    Fireblocks

    Fireblocks

    Fireblocks

    Build, run and scale a profitable digital asset business. Fireblocks is an all-in-one platform to store, transfer, and issue digital assets across your entire ecosystem. With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. Enjoy peace of mind with the only insurance policy that covers assets in storage, transfer and E&O. SOC 2 Type II and regular pen testing from ComSec and NCC Group.
  • 21
    Lockchain

    Lockchain

    Lockchain

    Avert catastrophic events in digital assets with Lockchain’s AI-powered security data pipeline. Lockchain aggregates on-chain data and available open source intelligence to provide you with insights on risks ahead of time. Receive alerts via email, Slack, or Telegram that explain to you exactly what risk events are happening right now that are relevant to your portfolio. Lockchain checks on-chain data to make sure your assets are where the exchange says they are. Monitor every custody platform in one place. Lockchain's AI interprets countless data sources. Get access to Lockchain’s 24/7, real-time due diligence and automation platform, so you can avert the catastrophic events in the world of digital assets. Use Lockchain's database of security and trust data as a part of your due diligence process. Lockchain monitors and alerts you to additional impacts based on current risk events. Tell Lockchain exactly what parts of your portfolio to monitor.
    Starting Price: Free
  • 22
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 23
    BlockchainDefender

    BlockchainDefender

    BlockSafe Technologies

    Blockchain Defender acts as a gateway between the application and a private blockchain. It examines every message, checks if it is allowed as per enterprise rules & policy, scans the contents of data fields for malware and authenticates transactions via the ProtectID® system. Content Scanner to stop malware before it enters the blockchain. BlockSafe Technologies™ is a subsidiary company of StrikeForce Technologies, Inc. (OTCQB: SFOR), a leading provider of cybersecurity solutions for consumers, corporations, and government agencies. BlockSafe Technologies™ has been granted licensing rights to implement and distribute the patented, award-winning cybersecurity technology offered by StrikeForce Technologies, Inc.
  • 24
    Beosin EagleEye
    Beosin EagleEye provides 24/7 blockchain security monitoring and notification services. It sends customers real-time security alerts and warnings when it detects risks like hacker attacks, frauds, flash loans, rug pulls through on-chain and off-chain data analysis, and multi-dimensional security assessments. 1. 24x7 Blockchain Project Security Monitoring 2. Risk Transaction Identification, Such as Large Outflow, Flash Loan, Privileged Operation, Exploiter, etc. 3. Real-time Security Incident Alerts and Warnings 4. Based on On-chain and Off-chain Data Analysis 5. Multi-dimensional Security Assessments 6. Blockchain Sentiment Notification Support User Interface & API Method
  • 25
    Elliptic

    Elliptic

    Elliptic

    Blockchain analytics, training, and certification for crypto businesses, financial institutions, and regulators. Manage financial crime risk, achieve regulatory compliance, and grow with confidence. Our crypto compliance solutions and services are used by crypto businesses, financial institutions, and regulators to detect and prevent financial crime in cryptoassets. Blockchain analytics across more than 100 cryptoassets and 10 billion+ data points provide accurate, actionable insights that businesses rely on to mitigate risk and be compliant. Elliptic provides blockchain analytics for cryptoasset compliance. Enable your compliance team to manage risk across 100+ cryptoassets and fulfill regulatory requirements. Compliance is a competitive advantage that builds trust with regulators, customers, and partners. Having the most accurate AML monitoring solutions is critical, as is investing in your team to build the knowledge needed to remain compliant.
  • 26
    Nefture

    Nefture

    Nefture Security

    Nefture is a blockchain security company. We provide crypto businesses with a suite of security tools to protect their users against fraudulent activity. Our web3 security API has four endpoints: - Transaction Security API : We screen transactions with our Fraud Detection Engine, ensuring that only safe transactions are processed and dangerous transactions are blocked. - Wallet Security API : Get risk score from a wallet address (EVM) - Approvals API : Get approval risk from a wallet address (EVM) - Token Scanner API : Get security check on a specific token (ERC20 - ERC721)
  • 27
    CipherTrace

    CipherTrace

    CipherTrace

    CipherTrace delivers cryptocurrency AML compliance solutions for some of the largest banks, exchanges, and other financial institutions in the world because of its best-in-class data attribution, analytics, proprietary clustering algorithms, and coverage of 2,000+ cryptocurrency entities, more than any other blockchain analytics company. Protection from money laundering risks, illicit money service businesses and virtual currency payment risks. Know your transaction automates Crypto AML compliance for virtual asset service providers. Powerful blockchain forensic tools enable investigations of criminal activity, fraud, and sanctions evasion. Visually trace the movement of funds. Monitor crypto businesses for AML compliance, evaluates KYC effectiveness and audits performance. CipherTrace’s certified examiner training provides hands-on instruction in blockchain and cryptocurrency tracing.
  • 28
    GK8

    GK8

    GK8

    GK8 offers institutions an end-to-end platform for managing blockchain-based assets, including custody, DeFi, staking, NFT, CBDC, and tokenization support. GK8’s regulation-ready solution includes the world’s first ‘true’ Cold Vault that enables its clients to create, sign, and send secure blockchain transactions without internet connectivity. When paired with our propriety, patented MPC technology, which offers an unlimited number of automatic co-signers, the GK8 solution eliminates any single point of failure while transacting at scale. Both are managed by our policy engine combines best-in-class policy management technology with workflow automation. GK8’s solution also supports secure tokenization, features universal support of all EVM-compatible layer-1 blockchains, and grants users instant access to all layer-2 smart contracts. Customers have access to the highest insurance coverage in the market ($1B per Vault).
  • 29
    Scorechain

    Scorechain

    Scorechain

    Scorechain is specialized in blockchain analytics and crypto compliance tools and helps worldwide companies comply with AML regulations on crypto-assets. Scorechain Blockchain Analytics Suite covers Bitcoin, including Lightning Network detection, Ethereum with ERC20 and stablecoins, XRP Ledger, Litecoin, Bitcoin Cash, Dash, Tezos, Tron with TRC10/20 tokens, and BSC with BEP20 tokens. The fully customizable platform is available on UI and API and comes with reporting, transaction tracking, risk assessment, automatic red flags indicator, real-time alert features, and much more. In addition, users can make use of Scorechain's Exploration Tool, Case Manager, and Entity Directory to implement complete and comprehensive crypto compliance processes. With a powerful and unique scoring system, Scorechain's products allow traditional finance players and cryptocurrency companies to apply a risk-based approach to this new class of assets and fulfill all new regulatory requirements.
  • 30
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 31
    Blowfish

    Blowfish

    Blowfish

    Blowfish makes it easy to identify & stop fraud before it happens. Join the leading wallets protecting their users funds with the blowfish security engine. We use transaction analysis and machine learning to detect fraud from multiple angles. Scan Solana transactions in order to receive recommended actions, tailored warnings and human-readable simulation results explaining what the transaction will do. Before a user approves a blockchain transaction, it is paramount to show them how executing this transaction will impact their crypto assets. In addition, it's important to alert them if they are interacting with a known malicious or suspicious dApp or smart contract.
  • 32
    CertiK Skynet
    CertiK Skynet is the intelligence engine powering the security scores seen on Security Leaderboard. It provides 24/7 security analysis for your smart contracts. By leveraging a combination of static and dynamic technologies, Skynet provides an intelligence engine that works around the clock to verify the security of your project and smart contract. Through the publication of an easily accessible, human-readable, security score, users are able to assess the security of a project at a glance.
  • 33
    Notebook

    Notebook

    Notebook

    Zero-knowledge cryptography for anonymous KYC and soul-bound credentials. We believe that the future of trust is blockchain. Notebook helps you secure your identity and your data, so you can authenticate yourself in a trustless world. Notebook leverages fragmented identity and Zero-Knowledge Proofs to keep users anonymous. A Notebook is stored on-chain in a smart contract, meaning no individual or corporation owns your identity or data but you. A Notebook is the best way to store summary statistics, such as metrics for credit score and bad-actor behavior. Storing such metrics makes for a more fair world, where people are held accountable for all their actions and believe in the greater good. The PII data required when a user onboards prevents an individual from creating multiple Notebooks, without compromising on their privacy. Notebook's identification system is dissociated from the user's wallet addresses, allowing the same identity to be used cross-chain.
  • 34
    Webacy

    Webacy

    Webacy

    Webacy is the ultimate protection layer for your self-custodied assets. We've created a super simple solution using smart contracts to help you secure your blockchain-based assets using a three pronged approach: Assess, Monitor, Act. With our Risk Score, Assess the risk of your wallet to potential compromises. With Wallet Watch, Monitor your transactions and approvals in real time across all your wallets. With Panic Button, Act on potentially suspicious transactions by ejecting your assets in a single click. Our self-executing contracts will allow us to expand into products like transaction firewalls through private RPC's, mempool intercepters, and more. Our Risk Score is currently embeddable into other products like marketplaces, exchanges, on-ramps, payment methods, and wallets - all to protect the sender and the recipient from interacting with potentially compromised wallets. Webacy is creating a safer web3 for everyone.
  • 35
    Civic

    Civic

    Civic Technologies

    Meet KYC & AML requirements with Civic’s compliance tools for decentralized finance (DeFi), public blockchains, NFTs, and businesses. Allow qualified, known users to participate in permissioned markets. Liquidity providers, dApp developers, and institutional participants can manage risk while creating trust in the DeFi ecosystem with Civic’s compliance tools. Civic Pass sets the stage for more checks and balances within the DeFi ecosystem. Users must meet rigorous requirements before being issued a Civic Pass to access a permissioned market and are monitored for ongoing adherence to the rules. AI-powered identity verification combined with human review to ensure that your users are real, always. Email and liveness verification, biometrics, and a passcode-protected app all designed to keep bad actors out.
    Starting Price: $250 per month
  • 36
    Unbound Crypto Asset Security Platform
    The only FIPS 140 L2 certified Multi-Party-computation (MPC) security platform for digital assets. With Unbound’s Crypto Asset Security Platform (CASP) you can define multi-party risk-based approval policies that adhere to local regulations, can integrate HSMs and offline signers into one MPC based platform. A FIPS 140 L2 certified software solution that eliminates this single point of failure of public-key cryptography by giving you a secure, distributed way to sign transactions while managing all your digital assets. With Unbound CASP, institutional investors don’t have to choose between regulatory adherence, peace of mind, and asset productivity. One comprehensive system that safeguards digital assets in both ‘cold’ and ‘hot’ vaults, while using MPC-based workflows and approval policies to secure the transfers between the two types of vaults. CASP supports any approval-policy structuring and any (unlimited) number of cryptographically validated signers.
  • 37
    AnChain.AI

    AnChain.AI

    AnChain.AI

    See how our team leveraged our CISO™ solution to quickly locate and trace these infamous hacked funds for law enforcement. We combine our deep expertise in ransomware with Machine-Learning enabled tools to help protect institutions from regulatory liability. We are at the forefront of enabling developers to secure their DeFi projects, DApps for mainstream adoption. Cryptocurrency Anti-Money Laundering made simple, fast, and preventive. AI-powered, behavior-based intelligence connects cryptocurrency to real-world entities, enabling your business to secure crypto assets, quantify risk, and remain KYC/AML compliant. Interactive graph-based investigation tools augment your analytics efforts to reveal complex entity relationships involving thousands of addresses.
  • 38
    Blockaid

    Blockaid

    Blockaid

    Enable builders to protect users from fraud, phishing and hacks. Speed is critical for UX, which is why Blockaid provides the fastest simulations. By working with industry leaders, Blockaid analyzes the largest set of transaction data. Simulate offchain signatures as well as onchain transactions, across any chain. Proactively protect users from interacting with malicious dApps. Proprietary technology powers Blockaid to be the first to detect any malicious dApp. Securing industry leaders who serve millions of users ensures Blockaid has superior data. From malicious airdrops to scam tokens, Blockaid detects any method of attack. Instantly block malicious tokens as soon as they are sent to your users
  • 39
    STAX

    STAX

    Stax-WMS

    Stax automates AWS to accelerate your business. With a secure platform to govern cloud management, your engineers can focus on what your business was created to do. Stax delivers an enterprise-grade foundation out of the box, so you can begin deploying applications in a matter of weeks. Our pay-as-you go model means no upfront capital expenditure, and a platform that can scale as your business grows. Increase productivity by reducing the time needed to maintain your cloud ecosystem. With prefabricated patterns, proactive guardrails and actionable insights across cost, risk and compliance, automate cloud operations so your engineers can build apps that deliver value for your business.
  • 40
    StormForge

    StormForge

    StormForge

    StormForge is the only platform that combines Enterprise-Grade Performance-Testing-as-a-Service with Machine Learning powered resource tuning to deliver optimal Kubernetes application performance at the lowest possible cloud cost. Discover how StormForge can transform your Kubernetes environment and resource management. The average StormForge Customer sees a 50% improvement in their application performance with 50% fewer cloud resources in fewer than 3 days. Innovate faster and gain key application and architectural insights. Proactively ensure the reliability of cloud platforms. Automate efficiency. Deliver developer-ready infrastructure. Empower engineers to make smart business decisions. Reduce cloud costs. Ensure cloud initiatives meet business goals. We’ll connect you with a CKA who will learn about your current Kubernetes configuration then show you a demo of the StormForge Platform.
    Starting Price: Free
  • 41
    Infosys Cobalt
    Infosys Cobalt is a set of services, solutions, and platforms that acts as a force multiplier for cloud-powered enterprise transformation. Infosys Cobalt helps businesses redesign the enterprise, from the core, and also build new cloud-first capabilities to create seamless experiences in public, private and hybrid cloud, across PaaS, SaaS, and IaaS landscapes. With Infosys Cobalt’s community leverage, enterprises can rapidly launch solutions and create business models to meet changing market needs while complying with the most stringent global, regional and industry regulatory and security standards. Enterprises can leverage the full potential of the cloud ecosystem and Infosys Cobalt’s thriving community of business and technology innovators to drive increased business value.
  • 42
    UKCloud

    UKCloud

    UKCloud

    Hundreds of organisations use our multi-cloud platform to make their transformation happen – cheaper, faster and safer. We’re dedicated to the digital transformation of our nation’s public services through our flexible, secure and cost-effective multi-cloud platform, people and partners. As multi-cloud experts, we provide an easy way to migrate existing systems (such as Oracle and VMware) into the cloud; giving you the time and space you need to build or buy cloud native applications (using Azure and OpenStack/OpenShift) that exploit digital technologies such as artificial intelligence, sensor networks (IoT) and automation. UKCloud gives you the choice of cloud technology, the choice of cloud deployment (private cloud, public cloud, secure cloud) and the choice of cloud service model (infrastructure, platform, software) so that you can avoid lock-in to a single cloud and accelerate your digital transformation.
  • 43
    GlobalDots

    GlobalDots

    GlobalDots

    20-year world leader in cloud & web innovation, connecting over 1,000 global businesses such as Lufthansa, Playtika, AppsFlyer, Fiat and Payoneer with the latest technologies. Our ever-growing solution portfolio contains over 80 innovative technologies, including: Security, Performance, DevOps & Cloud Management, Corporate IT, and advanced AI/ML models. Led by a team of innovation-driven engineers & architects, GlobalDots offers easy end-to-end technology adoption. Proactively introducing newer, better solutions, it helps businesses maintain a scalable, up-to-date technology posture in a quickly-changing world. Its enterprise clients breeze through cloud transformation; Its growing, cloud-native clients benefit from scalable, cost-effective and highly secure infrastructures. With our services, clients achieve significant cost reductions, accelerated business processes, and globally scalable infrastructures.
  • 44
    Cloudhelix

    Cloudhelix

    Cloudhelix

    The cloud solution you need isn't necessarily available when you need it. The cloud presents exciting opportunities for enterprises, however, capitalizing on them isn't always straight forward. Legacy technology, increasing compliance requirements and the daunting prospect of full-blown digital transformation are all common obstacles or sticking points holding businesses back. In order to capitalize on innovative ideas at the rate of the modern world, it’s crucial that businesses have the best cloud foundations in place. Enterprises are looking to safeguard their future by moving away from technology and ways of working that put them at risk. With our cloud platform providing consistent high performance, along with our leading support and cloud management, we'll help you move toward a scalable and secure cloud-first strategy, regardless of where you are today on the cloud journey.
  • 45
    CoreStack

    CoreStack

    CoreStack

    CoreStack, an AI-powered multi-cloud governance solution, empowers enterprises to rapidly achieve Continuous and Autonomous Cloud Governance at Scale. CoreStack enables enterprises to realize outcomes such as 40% decrease in cloud costs and 50% increase in operational efficiencies by governing operations, security, cost, access, and resources. CoreStack also assures 100% compliance with standards such as ISO, FedRAMP, NIST, HIPAA, PCI-DSS, AWS CIS & Well Architected Framework (WAF). CoreStack works with many large global customers across multiple industries including Financial Services, Healthcare, Retail, Education, Telecommunications, Technology and Government. CoreStack was recognized as IDC Innovator in Cloud Management Solutions and in the Gartner Magic quadrant for Cloud Management Platforms in 2020. CoreStack is a Microsoft Azure Gold & Co-Sell Partner and Amazon AWS Advanced Technology Partner.
    Starting Price: $49.00 per month
  • 46
    Unisys CloudForte
    We are living in an increasingly digital world as organizations everywhere look to the cloud to be a catalyst for transformation. Now is the time to assess your cloud strategy. Are you using cloud technology to its full potential? What other ways can you benefit from its power? Can you do so while minimizing security risk and upholding compliance? You can, with Unisys Cloud and Infrastructure Solutions. Our 100% vendor-agnostic approach ensures you experience the best capabilities among a broad ecosystem of platforms and providers for a cloud transformation that is cost-effective, secure, and efficient. The cloud delivers agility, scalability, and innovation. But to enjoy these benefits you need the right roadmap and team to execute it. Unisys can help. Our global cloud experience spans 110 countries and dozens of vertical industries, enabling us to apply the right expertise and scale to deliver the outcomes our clients seek.
  • 47
    BlocTrust

    BlocTrust

    BlocWatch

    BlocTrust provides independent, third-party verification, and assurance along with continuous awareness of the health of your blockchain for private blockchains and DLTs. BlocTrust runs as an endorsement node within a private blockchain network: verifying and endorsing blockchain transactions, providing assurance to all blockchain participants, and demonstrating the accuracy and legitimacy of endorsed transactions. BlocTrust maintains an independent, validated ledger of blockchain transactions. This authoritative record proves vital for following compliance mandates and meeting audit requirements. Designed to be both comprehensive and impartial, you can turn to BlocTrust for addressing disputes among Blockchain participants. BlocTrust generates monthly attestations that summarize the health and activity of the blockchain and display the blockchain operation metrics.
    Starting Price: $2,500 per month
  • 48
    QLUE

    QLUE

    Blockchain Intelligence Group

    QLUE™ helps you identify and track suspicious crypto transactions. Hundreds of investigators use QLUE™ to get evidence that close cases faster. QLUE™ is built by Blockchain Intelligence Group for Law Enforcement, the Financial Sector and Regulators. Visually track, trace and monitor illicit cryptocurrency activities involving Bitcoin (BTC), Bitcoin Cash (BCH) and Bitcoin SV (BSV) Ethereum (ETH, ERC20 tokens), Litecoin (LTC). BTC, BCH, BSV, ETH (ERC20 tokens), LTC. Whether you’re fighting terrorist financing, money laundering, human trafficking, drug trafficking, weapons trafficking, or other cyber crimes. QLUE™ is available in English, French, Japanese and Mandarin. It can also be set to display all Fiat Values in either USD, CAD, JPY, or EUR. Need a service that can reduce the number of hours, days or months needed to perform a crypto investigation? QLUE™ is that service, enabling your organization to trace, track and monitor bad actors that exploit cryptocurrencies.
  • 49
    NuCypher

    NuCypher

    NuCypher

    Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 50
    CUBE3.AI

    CUBE3.AI

    CUBE3.AI

    Protect your smart contracts by blocking malicious transactions rather than pausing your applications. Our advanced machine learning (ML) algorithms continuously monitor your smart contracts and transactions to provide real-time risk assessments, ensuring your web3 applications are protected against vulnerabilities, exploits, and compliance risks. Protect platform offers robust defenses against cyber exploits, wallet hacks, fraud, vulnerabilities, and compliance risks. By implementing our Real-Time Application Self-Protection (RASP) SDK and API, your web3 applications are shielded from malicious transactions, ensuring a secure environment for your users. Respond to cyber risks proactively with watchlists, alerts, reports, analytics, and logs.