+
+

Related Products

  • Aikido Security
    72 Ratings
    Visit Website
  • Wiz
    1,052 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,052 Ratings
    Visit Website
  • Resolver
    257 Ratings
    Visit Website
  • Netwrix Auditor
    296 Ratings
    Visit Website
  • Astra Pentest
    169 Ratings
    Visit Website
  • Action1
    455 Ratings
    Visit Website
  • NinjaOne
    3,047 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

Get full visibility on your cryptography during development and a full inventory in production. Resolve compliance issues before release and find and remediate dangerous vulnerabilities with ease. Cryptosense integrates into your CI/CD and supports software, hardware and cloud crypto services, making best practice cryptography fast, easy, and accessible to developers. Get instant visibility on all your cryptography, where you need it, and when you need it. Cryptography is a team game and your code is only one of the players. Cryptosense intercepts all the crypto-calls your application makes so that you can even see cryptography coming from libraries, middleware, key managers, config files, hosts, and containers. See every major cryptographic vulnerability in your app without becoming a crypto-expert. Cryptosense integrates with your existing toolchain so you get results in minutes instead of days.

About

cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices. These are safe and easy to use and don’t require developers to make many decisions. The other level is low-level cryptographic primitives. These are often dangerous and can be used incorrectly. They require making decisions and having an in-depth knowledge of the cryptographic concepts at work. Because of the potential danger in working at this level, this is referred to as the “hazardous materials” or “hazmat” layer. These live in the cryptography.hazmat package, and their documentation will always contain an admonition at the top.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Individuals in need of a Cryptography Management platform

Audience

Anyone seeking a tool to create cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cryptosense
Founded: 2013
France
cryptosense.com

Company Information

cryptography
Founded: 2013
cryptography.io/en/latest/

Alternatives

Tenable One

Tenable One

Tenable

Alternatives

Qualys VMDR

Qualys VMDR

Qualys

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

No info available.

Integrations

No info available.
Claim Cryptosense and update features and information
Claim Cryptosense and update features and information
Claim cryptography and update features and information
Claim cryptography and update features and information