Header banner
Revain logoHome Page

Security

All results
cryptshare logo
Revainrating 4.5 out of 5

3 Review

From the very beginning, we have designed Cryptshare as a secure digital transfer service. As such, Cryptshare makes sure your data is protected at all points of risk on the journey from sender to recipient, meaning from the time it leaves the relative safety of your firewall until it reaches its intended destination.

kruptos 2 professional logo
Revainrating 4.5 out of 5

3 Review

Kruptos 2 Software., a global leader in cross-platform data protection solutions, makes it simple for businesses, governments, and individuals to use and protect their most sensitive important data wherever it lives, whether it’s Windows®, Mac®, iOS, AndroidTM. or the removable Media. Kruptos 2 Software has offices in Europe and Asia. More than 2…

Read more about this company
memberprotect logo
Revainrating 4.5 out of 5

3 Review

Uses encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.

netnut proxy network logo
Revainrating 4.5 out of 5

3 Review

NetNut provides the fastest residential proxies in the market to businesses, with a residential proxy network that has over 10 Million IPs and growing on a weekly basis. NetNut gets its IPs directly from ISPs and does not depend on an end-user or P2P networks, and offers particular advantages over others such as: • Faster proxy speed and one-hop…

Read more about this company
ghost pii logo
Revainrating 4.5 out of 5

3 Review

Capnion’s unique protocol is called Ghost PII and it focuses on personally identifiable information (or PII) like name, address, etc. Replace the PII in your pipelines now with encrypted data that, like a ghost, contains some of its unique essence but lacks that tangibility to cause harm. More concretely, your data is securely encrypted yet you can…

Read more about this company
sookasa for dropbox logo
Revainrating 4.5 out of 5

3 Review

Sookasa provides encryption and compliance for sensitive files across cloud storage services and mobile devices.

cosmian logo
Revainrating 4.5 out of 5

3 Review

Across industries, we help data-driven companies to lower the risk of manipulating sensitive data.

hide files logo
Revainrating 4.5 out of 5

3 Review

Secure your confidential files and folders. Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can password protect any secret or embarrassing files. Hide your files and folders from prying eyes. Set your master password and lock your files. No one can…

Read more about this company
essl logo
Revainrating 4.5 out of 5

3 Review

eSSL offers biometric security and access control solutions.

liapp logo
Revainrating 4.5 out of 5

3 Review

Just One-Click, We’ll Take Care of Security So You Can Focus More on Everything Else. LIAPP provides security features that mobile apps require to gain the power to protect themselves: Source code protection, Anti-tampering, Anti-debugging, Virtual machine detection, Hacking tool detection, Memory protection, Library protection, Game engine protection…

Read more about this company
sqreen rasp logo
Revainrating 4.5 out of 5

3 Review

Sqreen is an application security platform that provides extensive visibility and reaction capabilities to the threats targeting both legacy and modern cloud applications. Trusted by security teams, loved by developers, Sqreen improves the security standards of the world's leading organizations. Founded by former security experts at Apple, Sqreen…

Read more about this company
cyber armor logo
Revainrating 4.5 out of 5

3 Review

Utilize existing CI/CD tools to automatically generate secured environments with the first in-memory run-time workload and data protection

stratokey logo
Revainrating 4.5 out of 5

3 Review

StratoKey is a Cloud Access Security Broker (CASB) that specializes in securing cloud and SaaS applications with Encryption, Monitoring, Analytics and Defence (EMADTM).

qualys cloud platform. logo
Revainrating 4.5 out of 5

3 Review

Qualys' integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively. Our solutions empower various roles within the organization to meet your unique requirements. Built on top of Qualys’ Infrastructure and Core Services, the Qualys…

Read more about this company
threat stack logo
Revainrating 4.5 out of 5

3 Review

Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. The Threat Stack Cloud Security Platform® helps organizations improve operational efficiency by…

Read more about this company
webroot dns protection logo
Revainrating 4.5 out of 5

3 Review

What if you could stop up to 88% of known malware BEFORE it hit endpoints and networks? Well, you can. Webroot® DNS Protection works at the DNS layer to prevent malicious traffic and block malware before it infiltrates your networks, endpoints, and end users. Plus, it’s the first DNS filtering product on the market to combine privacy and security by…

Read more about this company
cloudflare ddos protection logo
Revainrating 4.5 out of 5

3 Review

Cloudflare provides advanced DDoS protection including DNS Amplification, SYN/ACK, Layer 7 Attacks.

k2 security platform logo
Revainrating 4.5 out of 5

3 Review

K2 Security Platform from K2 Cyber Security delivers signature-less runtime web application and application workload protection with minimal false alerts to protect against sophisticated attacks including OWASP Top 10 and memory-based attacks. K2 Security Platform protects against zero-day attacks aimed at application vulnerabilities in real-time and…

Read more about this company
imperva real-time application self protection (rasp) logo
Revainrating 4.5 out of 5

3 Review

IMperva provides runtime application self protection (RASP) and application security-as-a-service.

kybersecurity application protection logo
Revainrating 4.5 out of 5

3 Review

KyberSecurity protection is a suite of advanced multilayered cybersecurity technologies. The security engines operate interconnected leveraging an outstanding protection against the most sophisticated attacks.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.