Last Updated on 1 Aug. 2016, Total: 24 Products


  1. Voice Encryption

    Pryvatenow provide an industry leading encrypted voice service which operates over carrier grade infrastructure. Get ready to Secure over a 3G/4G, GPRS, EDGE, LTE, UMTS, HSPA, W-CDMA or WIFI connection, even at low bandwidths... Read More

  2. Apex PDF Encryption Software

    PDF encryption software protect your PDF document from harmful user those defect your valuable document. PDF file encrypted application support most of all required option those able to protect your PDF document. Tool permitted you to set password on PDF file, use PDF encryption technique like 128 bit and 40 bits. You can restrict PDF page by locking PDF printing,... Read More

  3. SSL.com Certificates

    SSL.com believes electronic security should be easy to implement and accessible to everyone without sacrificing product integrity. Because of our core beliefs, SSL.com is engaged with the community at large to provide unprecedented levels support and to offer an enhanced user experience... Read More

  4. HsCipherSDK Encryption Library

    HsCipherSDK is an Encryption Library providing an API to a suite of symmetric cryptographic algorithms and digital signing functions. The library includes block and stream cipher modules: AES, 3DES, ARC4, CAST-128, Blowfish,Twofish,MD5,SHA-1,SHA256, Whirlpool. Includes Standard DLL, C Sharp DLL to use from C++,Visual Basic, C Sharp or other languages, code examples, documentation. HsCipherSDK includes full source code in C... Read More

  5. dotNet Protector 64 bit x64

    dotNet Protector is a powerful .NET code protection system that prevents your assemblies from being decompiled. Console exe, windows exe and windows services,. You can protect a whole application (main exe, referenced dlls) in a single executable... Read More

  6. Bandwidth Splitter

    Bandwidth Splitter is a program extension for Microsoft ISA Server that supplements it with new features to allow more rational sharing of the existing Internet connection bandwidth and distributing it among all users and servers according to preset rules. Fearures include: traffic shaping, traffic quoting, and detailed real-time monitoring... Read More

  7. Dekart Private Disk

    Powerful, reliable and flexible disk encryption program. Hide your programs and data, and exclusively restrict access to them. Private Disk shields files from viruses and malware even if your antivirus or antispyware program fails to protect the system. Your data are truly portable - you can encrypt your information on USB drives, CDs, DVDs and work with the protected files... Read More

  8. Safe AutoLogon Password Server

    Safe AutoLogon Password Server centralizes password management for Safe AutoLogon clients. With it, you ensure your Safe AutoLogon clients automatically logon with the correct password every time, even if the password has changed and the client has not been powered on in months. You can import users from Active Directory, synchronize password changes to Active Directory on one or many... Read More

  9. HOBLink Secure

    HOBLink Secure, the complete, platform-independent package for secure communication and authentication in TCP/IP networks, has been awarded the German IT Security Certificate. After a thorough examination process by an accredited and licensed evaluation facility, the German Federal Office for Information Security has awarded HOBLink Secure this certificate, confirming HOBLink Secure's conformance to the Common Criteria for IT Security Evaluation. Based... Read More

  10. Reflection for Secure IT

    Reflection for Secure IT is an SSH-based security solution built for UNIX, Windows, and z/OS environments. By replacing nonsecure Telnet and FTP with Reflection for Secure IT, you can safeguard private data, shore up network defenses, and meet increasingly stringent regulatory requirements with confidence. Reflection for Secure IT lets you: Secure remote administration of critical servers, even over untrusted networks;... Read More