AxCrypt is an encryption software with 256-bit AES encryption, developed for both businesses and private individuals. The Premium and Business subscriptions offer cloud storage awareness and key sharing to enable file sharing... En savoir plus

StackRox is a Kubernetes and container security platform, which helps businesses and government agencies protect cloud applications and manage processes related to network segmentation, incident response and more. The platform... En savoir plus

Ubiq is a cloud-based encryption solution designed to help businesses of all sizes build customer-side encryption and protect data across various applications, programming languages, storage infrastructure and cloud environments... En savoir plus

HaltDos helps users protect websites and web services by providing DDoS mitigation. It helps monitor, detect and mitigate DDoS attacks. It offers heuristic, behavioral and reputational-based anomaly detection to counter DDoS... En savoir plus

STORM is a cybersecurity software designed to help security operation centers identify, prioritize and resolve incidents. The platform enables administrators to collect and analyze cybersecurity incident-related data and... En savoir plus

OVHcloud is a cloud security software designed to help businesses with web hosting, domain name selection, email exchanges and more. The platform enables administrators to build websites and protect them against distributed... En savoir plus

Anchore is a container security solution that helps DevOps teams scan and analyze software containers for vulnerabilities and ensure security through action plans, policy-based compliance and API-based automation.... En savoir plus

EmpowerID is an identity management suite of solutions, which enable businesses in banking, healthcare, manufacturing and other sectors to securely access cloud and on-premise applications. Professionals can automatically create,... En savoir plus

MeSign Email Encryption is a PKI-based solution that helps businesses protect their corporate emails against data breaches, ransomware, phishing and more. Key features include end-to-end encryption, digital signature, timestamp,... En savoir plus