Companies similar to INFOSEC GLOBAL FEDERAL
Sign up to Download

121-150 of 193,496 results

  • www.cyberens.eu
Cyberens is originally a small consulting company specialised in defence, security and space technologies. Our customers are French or from foreign countries... Our activities are now mainly oriented toward software development for cybersecurity and..

Relevance: 14.554248
  • cryptin.io
Cryptin provides boutique software development for digital art and AI. Our turnkey process involves product definition and management, market research and quality control... One of the hardest problems is the proper management of identity. Identity..

Relevance: 14.554248
  • veriqloud.com
  • 2
  • 2
In the mid-80's, scientists discovered a way to communicate securely over an insecure communication channel. Their cryptographic protocol, named quantum key distribution, uses the quantum properties of light to reach a much higher security than any..

Relevance: 14.554248
  • pomcor.com
  • 6
Pomcor is a graduate of the San Diego CONNECT Springboard program. We are currently based in Sacramento. You can find out more about us in the company page... Pomcor conducts research on Web and mobile technology, currently focusing on cryptographic..

Relevance: 14.525837
  • www.cryptoworks21.com
  • 8
  • 12
CryptoWorks21 was founded by Professor Michele Mosca. From its founding in 2012 until 2018, it was the NSERC CREATE Training Program in Building a Workforce for the Cryptographic Infrastructure of the 21 st Century (CryptoWorks21) with partner..

Relevance: 14.525837
  • magensa.net
  • 1
Serving enterprises globally, Magensa provides a wide range of innovative tools and transaction processing services for authentication, cryptographic security, and privatization of sensitive data. Magensa's encryption/decryption services, payment..

Relevance: 14.524259
  • sysca.co.uk
  • 1
  • 1
This is a niche area within the security industry in which we are highly specialised. We provide specialised services to organisations and companies such as exploit development and reverse engineering to discover vulnerabilities, cryptographic flaws..

Relevance: 14.520466
  • www.pqcrypto.eu
  • 1
  • 8
Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures..

Relevance: 14.463019
  • contegocyber.com
  • 4
  • 3
  • 1
Quantech Services, Inc. is a professional consulting service company, of which Contego Cyber Solutions is a division. Quantech is focused on end-to-end systems engineering, cyber security, program management, and financial management that guides..

Relevance: 14.462944
  • www.sacramentocloudstorage.com
  • 1
We have been in business providing I.T. Consulting Services since November 2002. We have developed our own backup solution after testing every other platform on the market, as they all came up short in one aspect or another... We are a commercially..

Relevance: 14.379284
  • crypto.stanford.edu
  • 1
  • 1
We are developing cryptographic tools with applications to crypto currencies and blockchains. We are also teaching a course on the topic, CS251...

Relevance: 14.369701
  • www.jvn.ca
  • 1
We provide consulting services in the area of cryptographic processing for banking systems such as PIN processing, Key Management,..

Relevance: 14.367483
  • rayden.io
Rayden Cryptosystem is a suite of cryptographic hash, private/public key generator, and cipher algorithms for both symmetric and asymmetric encryption. Rayden features 4096-bit length keys; 256/512/1024/2048-bit length, 118/296/716/1684-bit..

Relevance: 14.324553
  • reprosec.org
REPROSEC is an umbrella project for works on rigorous, formal methods to prove (cryptographic) protocols secure in a mechanized, reproducible way...

Relevance: 14.308756
  • www.o-log-n.com
  • 1
  • 1
Founded in 2011, OLogN Technologies is a research and development company focused on developing ground-breaking security technologies aiming to curb both malware impact and phishing threats in both consumer and enterprise environments... To allow..

Relevance: 14.21648
  • www.embeddeddisco.com
Embedded Disco is an implementation of disco, a protocol designed by merging the Noise protocol framework and the Strobe protocol framework. This means that it supports a subset of Noise's handshakes while offering the cryptographic primitive Strobe..

Relevance: 14.20383
  • www.confium.org
Confium is an open-source framework providing a cross-platform trust store and generalized platform for cryptographic implementation...

Relevance: 14.159588
  • www.bloombase.com
  • 5
  • 4
Bloombase develops and markets a complete basket of enterprise information security solutions to address these security issues. Bloombase Technologies formulated a vision of least invasive information security solution approach for next generation..

Relevance: 14.132441
  • www.schmurr.net
  • 1
  • 5
Maintained the Bank's IT infrastructure and its security for Credit Card issuing, acquiring and Wealth Management business units running in a 24/7 production environment. Ensured its compliance, availability and security to fulfil industry standards..

Relevance: 14.099909
  • sietseringers.net
Cryptography: Idemix, BBS+, zero-knowledge proofs, TLS, signature schemes such as ECDSA, (a)symmetric encryption, AES, HMACs... As an independent solution architect and software engineer, I specialize in digital identity: software implementing..

Relevance: 14.07233
  • www.securetech-consultancy.com
  • 4
  • 5
Secure Tech Consultancy (Pvt) Ltd is an IT Consulting and Systems development/Integration firm based in Pakistan. Established in 2008, Secure Tech Consultancy has successfully carried out ICT (Information and Communication Technologies) and Identity..

Relevance: 14.07093
  • www.appler.net
Matthew Appler has led Corsec to become the undisputed leader of the IT security product validation and certification industry. Matthew not only defines the company's strategic vision, he makes it a reality by applying his extensive expertise to..

Relevance: 14.070403
  • www.dnscrypt.info
DNSCrypt is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS..

Relevance: 14.070403
  • 9esec.io
  • 1
  • 1
With our expertise we create security solutions which are robust and easy to use, leveraging leading open source technology. We're specialists in integrating our solutions seamlessly into the clients' infrastructure... We bring open-source firmware..

Relevance: 14.055412
  • www.isara.com
  • 7
  • 2
  • 3
ISARA Corporation is the world's leading provider of crypto-agile and quantum-safe security solutions. Learn more about the quantum threat, ISARA Radiate Quantum-safe Toolkit, ISARA Catalyst Agile Digital Certificate Technology and other industry-..

Relevance: 14.040358
  • www.btcrypt.org
Bitcoin delivers a variety of cryptographic options, which were not explored in the past. On this page we like to try a few, web-based things...

Relevance: 14.029785
  • www.motacoin.net
  • 1
MotaCoin is new decentralized, trustless, Cryptographic secured ecosystem for licensed pharmacies. Designed for high adoption. Implemented with speed. Download our iOS or Android Wallet! MotaCoin is new decentralized, trustless, Cryptographic secured..

Relevance: 13.980642
  • www.primefactors.com
  • 1
  • 4
EncryptRIGHT is the leading data security platform that simplifies application layer encryption and data protection by abstracting data protection policies from application programming, while providing a complete separation of duties between..

Relevance: 13.950522
  • www.zellic.io
  • 1
With Zellic, you get access to the best hackers in the world. Before Zellic, we founded the #1 CTF team worldwide. These CTF competitions attract world-renowned security researchers and white hats to exploit web, desktop, and mobile apps and..

Relevance: 13.907721
  • www.salixllc.com
  • 1
From project planning, coding throught testing and support Salix L.L.C. can help you meet your project deadlines... Leading manufacturer of mailing and shipping systems and mail support equipment HaslerĀ®, Inc. relied on Salix L.L.C. to manage their..

Relevance: 13.907721