Header banner
Revain logoHome Page

Security

All results
zyudly labs logo
Revainrating 5 out of 5

3 Review

Zyudly Labs Provides deep learning powered fraud and cybersecurity solutions for the financial industries.

cloudsploit logo
Revainrating 5 out of 5

3 Review

CloudSploit provide a software for security and configuration scanner that can detect threats in AWS account.

hytrust cloud advisor logo
Revainrating 5 out of 5

3 Review

HyTrust CloudAdvisor for Data enables you to define policies to automatically discover the data that’s valuable to you, detect anomalous user access behaviors, and defend your organization against careless exposure, data loss, malicious users, and regulatory noncompliance.

semperis logo
Revainrating 5 out of 5

3 Review

With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital…

Read more about this company
axcrypt logo
Revainrating 5 out of 5

3 Review

onesecure quantum security logo
Revainrating 5 out of 5

3 Review

Quantum Key Distribution, or QKD, is one kind of quantum cryptography protocol. It harnesses the fundamental uncertainty of quantum particles such as photons to encode information into them to produce a secure key. This can be a tricky subject to explain, so let’s introduce Alice and Bob to help. Let us say that Alice and Bob want to share a secret key…

Read more about this company
lastline defender logo
Revainrating 5 out of 5

3 Review

Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. We offer the industry’s most accurate detection of threats entering and operating within your network, both on premises and in the cloud. The company’s software…

Read more about this company
proxymesh logo
Revainrating 5 out of 5

3 Review

Proxymesh provides rotating network of proxy servers for web crawlers to avoid IP bans and rate limits.

securezip logo
Revainrating 5 out of 5

3 Review

SecureZIP provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use.

cryptainer pe logo
Revainrating 5 out of 5

3 Review

ENCRYPT ANY DATA, ANY DISK, FILES AND FOLDERS ON ANY WINDOWS PC USING CRYPTAINER PE ENCRYPTION SOFTWARE

enveil zeroreveal logo
Revainrating 5 out of 5

3 Review

Enveil's ZeroReveal products protect Data in Use, ensuring that nothing is ever revealed during the entire processing lifecycle.

secubox logo
Revainrating 5 out of 5

3 Review

SecuBox is an AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. It provides safe, secure and convenient storage for all important and business critical information.

infatica global proxy network logo
Revainrating 5 out of 5

3 Review

Infatica is a global proxy network that provides reliable residential IPs mainly for the following business purposes: Price comparison – comparing prices from different user perspectives, often for travel and niche products. β€’ Ad verification – ensuring website ads are properly targeted to their intended audience, that ad links function properly, and…

Read more about this company
hermes logo
Revainrating 5 out of 5

3 Review

kindite logo
Revainrating 5 out of 5

3 Review

Kindite opens up the cloud for enterprises and regulated organizations, overcoming risks of privacy, compliance and control using disruptive encryption technology.

nordlocker logo
Revainrating 5 out of 5

3 Review

NordLocker is an easy-to-use file encryption tool. It lets you store and share your data securely. With a simple drag-and-drop function, NordLocker secures your files with powerful end-to-end encryption. So put your mind at ease – encryption is on us.

psdt logo
Revainrating 5 out of 5

3 Review

Bringing in the freedom to have military grade encryption for everyone in Web 3.0 by acting as a medium of encryption in exchange of almost all digital data with ULTIMATE ARMOR USER DATA PROTECTION through blockchain technology.

sharesecret logo
Revainrating 5 out of 5

3 Review

Safely share passwords, tokens, credit cards, and anything else in ShareSecret's short-term, auto-expiring encrypted vault.

gimmie proxy logo
Revainrating 5 out of 5

3 Review

Gimmie Proxy is a rotating proxy API

ssl.com logo
Revainrating 5 out of 5

3 Review

SSL.com provides SSL/TLS & digital certificates to secure & encrypt data with 4096-bit SSL/TLS certificates, trusted by all browser.

Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.