Alternatives to Encrypted Data Gateway Engine

Compare Encrypted Data Gateway Engine alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Encrypted Data Gateway Engine in 2026. Compare features, ratings, user reviews, pricing, and more from Encrypted Data Gateway Engine competitors and alternatives in order to make an informed decision for your business.

  • 1
    Bitdefender Ultimate Small Business Security
    Bitdefender Small Business Security delivers enterprise-grade, layered cyber-protection designed specifically for small organizations. It covers Windows, macOS, iOS, and Android devices with centralized, easy-to-use management, so businesses without a dedicated IT staff can deploy and monitor security from one dashboard. Key features include multi-layered endpoint protection (machine learning, behavioral analytics, real-time monitoring, process termination, and rollback) to prevent known and unknown threats. It offers ransomware prevention and mitigation (detecting abnormal encryption attempts and restoring files from backups), fileless attack protection (memory/back-injection interference, script blocking), phishing & fraud prevention (blocking deceptive sites and warning users), and advanced exploit protection (real-time shield of browsers, Office apps, Adobe Reader) for comprehensive endpoint defense.
    Partner badge
    Compare vs. Encrypted Data Gateway Engine View Software
    Visit Website
  • 2
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure.
    Compare vs. Encrypted Data Gateway Engine View Software
    Visit Website
  • 3
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 4
    enforza

    enforza

    enforza

    The cost-effective alternative to AWS Network Firewall, Azure Firewall, and cloud-native NAT Gateways. Same features. Less cost. No data processing charges. enforza is a cloud-managed firewall platform that helps you build a unified multi-cloud perimeter with powerful firewall, egress filtering and NAT Gateway capabilities. With easy cloud management at its core, enforza is truly multi-cloud, enabling you to apply consistent security policies across multiple clouds and regions. - Install the agent on *your* linux instance (cloud or on-prem) with one command. - Claim your device on the portal. - Manage your policies.
  • 5
    Encryptik
    Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems. Every command can be automated and integrated with existing process. EDGE can work on foreground and on background (UNIX background process). Encryptik provides the best defense and allows you to layer the threat response, from all agents. Encryptik provides discovery, visibility, and advanced protections for critical data, along with a custom search. A native solution, with no additional cost to procure any further infrastructure. Minimum setup and configuration time. Encryptik provides with necessary tools to ensure that the existing clear data are completely protected.
    Starting Price: $20 per user per month
  • 6
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 7
    Duplicati

    Duplicati

    Duplicati

    Free backup software to store encrypted backups online For Windows, macOS and Linux. Duplicati works with standard protocols like FTP, SSH, and WebDAV as well as popular services like Backblaze B2, Tardigrade, Microsoft OneDrive, Amazon S3, Google Drive, box.com, Mega, hubiC, and many others. Backup files and folders with strong AES-256 encryption. Save space with incremental backups and data deduplication. Run backups on any machine through the web-based interface or via a command-line interface. Duplicati has a built-in scheduler and auto-updater. Duplicati is free software and open source. You can use Duplicati for free even for commercial purposes. Source code is licensed under LGPL. Duplicati runs under Windows, Linux, and MacOS. It requires .NET 4.5 or Mono. Duplicati uses strong AES-256 encryption to protect your privacy. You can also use GPG to encrypt your backup. Duplicati was designed for online backups from scratch.
  • 8
    Certbot

    Certbot

    Certbot

    Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS. Use our instruction generator to find custom commands to get Certbot on your server's environment. Pick your server's software and system above. Certbot will fetch Let’s Encrypt certificates that will be standard Domain Validation certificates, so you can use them for any server that uses a domain name, like web servers. You can also use these certificates for other TLS applications such as IMAPS. A command line is a way of interacting with a computer by typing text-based commands to it and receiving text-based replies. Certbot is run from a command-line interface, usually on a Unix-like server. In order to use Certbot for most purposes, you’ll need to be able to install and run it on the command line of your web server, which is usually accessed over SSH.
  • 9
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 10
    zdaemon

    zdaemon

    Python Software Foundation

    zdaemon is a Unix (Unix, Linux, Mac OS X) Python program that wraps commands to make them behave as proper daemons. zdaemon provides a script, zdaemon, that can be used to run other programs as POSIX (Unix) daemons. (Of course, it is only usable on POSIX-complient systems.) Using zdaemon requires specifying a number of options, which can be given in a configuration file, or as command-line options. It also accepts commands teling it what to do. Start a process as a daemon. Stop a running daemon process. Stop and then restart a program. Find out if the program is running. Send a signal to the daemon process. Reopen the transcript log. Commands can be given on a command line, or can be given using an interactive interpreter. We can specify a program name and command-line options in the program command. Note, however, that the command-line parsing is pretty primitive.
  • 11
    AWS Storage Gateway
    AWS Storage Gateway is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage. Customers use Storage Gateway to simplify storage management and reduce costs for key hybrid cloud storage use cases. These include moving tape backups to the cloud, reducing on-premises storage with cloud-backed file shares, providing low latency access to data in AWS for on-premises applications, as well as various migration, archiving, processing, and disaster recovery use cases. To support these use cases, the service provides three different types of gateways – Tape Gateway, File Gateway, and Volume Gateway – that seamlessly connect on-premises applications to cloud storage, caching data locally for low-latency access. Your applications connect to the service through a virtual machine or hardware gateway appliance using standard storage protocols, such as NFS, SMB, and iSCSI.
  • 12
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 13
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 14
    OpenText Core DNS Protection
    OpenText Core DNS Protection is a cloud-native security solution that monitors and filters every DNS request to block threats before they reach your users or devices. It prevents malware infections by stopping access to malicious domains and Command and Control servers, reducing the risk of data exfiltration. The platform offers full visibility into DNS activity through detailed logs, giving security teams greater insight into network behavior and potential vulnerabilities. With agent-level intelligence, it detects unauthorized DNS servers, enforces policy across encrypted DNS traffic, and eliminates DNS leaks in real time. Deployment takes only seconds, and protection applies on any network—whether employees are in the office, at home, or on public Wi-Fi. By acting as a DNS firewall, OpenText Core DNS Protection closes critical visibility gaps left by legacy tools and strengthens organizational resilience against modern cyber threats.
  • 15
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
  • 16
    Tape Encryption
    Designed to be an innovative, flexible, easily implemented, and comprehensive z/OS tape encryption solution. It helps ensure that your data is protected from breaches, even if your tapes fall into the wrong hands. Tape Encryption helps you safeguard your sensitive data and automate full lifecycle key management. And it can be implemented without the need to purchase expensive and complex hardware. With this mainframe solution, you can take steps to shield your company from fines, costly corrective processes, and the negative publicity that can occur when personal and business-critical data are compromised. Tape Encryption helps you implement your security strategy while containing costs. Protect against data breaches and the inherent potential for loss of revenue and negative press. Offers an automated solution to key management that exploits other Broadcom facilities to deliver optimum performance and limit processor overhead.
  • 17
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
  • 18
    SSProtect

    SSProtect

    Definitive Data Security

    The :Foundation Client is very small and uses minimal system resources, operating in the background and in response to user-driven activities. Access the UI to enumerate managed resources, view reports, or as an Administrator, deploy and manage Users, Service Components, and Organization resources. The :Foundation Client coordinates user-driven activity, dispatching secure requests to KODiAC Cloud Services while handling end-user application workflow integration. Decryption, re-encryption, authentication – never concern yourself with manual activities, the :foundation Client makes encryption both practical and easy. Access the list of managed items, viewing enumerated Version Instances and/ or your Managed Data Archive. Restore content, acquire and review Usage Reports, and even protect large data sets – all from the same set of User Interface controls available to every User independent from the Role they play in an organization.
  • 19
    BluVault

    BluVault

    Parablu

    Complete backup on the cloud with 100% security. Parablu's got your back(up). Safer and more secure than ever. BluVault ensures safe backup to cloud storage environments by securing data both while in transit and at rest. It protects the privacy and integrity of an organization’s data traveling between the enterprise and the cloud, by way of robust encryption and clear segregation of duties. Data secured by BluVault is encrypted with modules that meet the most stringent regulatory requirements, including GDPR. What’s more, YOU (the organization), retains control over the encryption keys and have complete flexibility and control over how and where your data is secured. Apart from protecting and safeguarding data from loss, misuse, and unauthorized alteration, BluVault is built to deliver complete control over the data protection process with detailed reporting, alerting and audit logs.
  • 20
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • 21
    DESwrap

    DESwrap

    Data Encryption Systems

    The DK2 and DK3 can be used in conjunction with our DESwrap software to give instant protection to .EXE and .DLL files. This is achieved by wrapping a protective shield around the application using encryption techniques designed and tested during the past 25 years to provide a very secure operating environment for your software. The Down Counter within the DESkey may be called from DESwrap. This feature provides the means to stop your software working after a pre-programmed number of executions. An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 22
    NetVault Plus
    NetVault Plus is an enterprise backup software solution designed to protect systems, applications, and data across hybrid-cloud environments. It offers continuous data protection, instant recovery, and safeguards against ransomware to minimize business downtime and data loss. The software supports immutable backups, anomaly detection, and data encryption to enhance security. Additionally, NetVault Plus includes global data deduplication, reducing storage costs by up to 93% both on-premises and in the cloud. Its comprehensive disaster recovery capabilities ensure the availability of business-critical systems and data, regardless of their location.
  • 23
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
  • 24
    SmartFlow

    SmartFlow

    Solana Networks

    SmartFlow is an IT cyber security monitoring tool that uses Anomaly Detection to pinpoint hard-to-detect security threats. SmartFlow complements existing signature based security monitoring tools. It analyzes network flow traffic to detect zero-day security attacks. Smartflow is an appliance based solution and targeted for medium and large enterprises. SmartFlow utilizes patent-pending anomaly detection techniques and network behaviour analysis to identify security threats in a network. It applies Solana algorithms on flow data such as Netflow to detect address scans, DDoS attacks, Botnets, port scans, malware etc. Zero day threats and encrypted malicious traffic (such as Botnet Command & Control) may escape detection by signature-based security monitoring tools. However, they will not escape detection by SmartFlow. SmartFlow distills network traffic and flow data into more than 20 different statistical measures which it continuously analyzes for early warnings of cyber threats.
  • 25
    PowerArchiver

    PowerArchiver

    PowerArchiver

    Compress, encrypt, exchange, and backup your data. Support for over 60 formats: ZIP, ZIPX, 7z, RAR, TAR, and more. Strongest possible compression with PA format. FIPS 140-2 validated 256-bit AES encryption! PowerArchiver combines many useful tools in a single package! Fastest and most feature-packed file management today! Advanced Codec Pack (.PA) is the most advanced format on the market. Encrypt, Decrypt, Sign and Verify in various AES and OpenPGP formats. FIPS 140-2 validated! Best format with strongest compression, data deduplication, and very secure encryption. Secure FTP client with all the features, including FIPS 140-2 validation! Automatically compress and encrypt files in Microsoft Office XP-2016. Access 6 different cloud services without the need to install their software! Full Enterprise Backup suite with shadow copy support, logs, network backup, and more! Mount ISO images in a virtual drive without having to burn them!
    Starting Price: $22.25 one-time payment
  • 26
    Bitdefender Small Office Security
    Get complete protection for your SOHO network to keep your small business safe from data breaches, phishing attempts, and malware attacks. Next-gen digital security designed for your small office/home office. You get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats, anywhere in the world. Bitdefender Small Office Security keeps your business safe against viruses, malware, ransomware, and all new and existing cyber threats. Regardless of the size, experience, or volume of your business, you need the best defense against fraud. Bitdefender Small Office Security prevents data breaches and secures your clients' personal and financial data. Webcam and microphone protection notifies you when apps try to access your webcam or microphone and lets you block unauthorized access. Keep your business private. Protect your bank info, passwords, and downloads from hackers, especially while using Wi-Fi on public networks.
  • 27
    Worldr

    Worldr

    Worldr

    Worldr defends the data you share in Microsoft Teams from external breaches while prohibiting outside organizations from exploiting your most sensitive digital assets. It can be utilized in any environment, whether that be cloud based or on-premise; our lightweight architecture can be deployed in minutes for any size organization. Ensure full ownership of data so no one, not even Microsoft, can access it. Messages, user details, and metadata are stored in a database protected by a transparent data encryption layer while encryption keys are stored in Hashicorp Vault. Store your data anywhere in the world based on compliance, legal or regulatory requirements. Adhere to sector specific data transfer and processing regulations and meet mandates enforced by various countries to ensure data sovereignty.
  • 28
    PoINT Archival Gateway

    PoINT Archival Gateway

    PoINT Software & Systems

    In today's world, data is being generated faster and faster, and in increasingly larger volumes – especially in fields like research, media or diagnostics. The PoINT Archival Gateway, a software product that securely stores large volumes of data on tape storage systems at high transfer rates and in compliance with regulations, solves the resulting problem of storing and archiving all of this data. The PoINT Archival Gateway is a software-based, high-performance object storage system and supports tape libraries. This combination makes it possible to store and archive hundreds of petabytes of data. The decisive factor that makes this possible is the way the PoINT Archival Gateway quickly receives data and securely writes it to storage media in a format that means this data can also be quickly read again afterwards. The PoINT Archival Gateway high level of scalability means it can handle transfer rates of over 1 PB per day.
  • 29
    Radware DefensePro
    DefensePro and DefensePro VA provide advanced DDoS prevention, protection and IoT botnet attack mitigation across legacy data center and public cloud. Part of Radware’s attack mitigation solution, DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques. Are you tired of fighting prolonged attack campaigns? Is your organization using the proper DDoS defense techniques to withstand today’s sophisticated DDoS attacks? With the threat of reduced revenues, higher expenses and damaged reputations, organizations need Radware’s hybrid attack mitigation solution that integrates real-time WAF, SSL protection and DDoS protection on-premise with a cloud service that is activated on-demand.
  • 30
    EMS DB Extract

    EMS DB Extract

    EMS Software

    EMS DB Extract for PostgreSQL is an impressive and easy-to-use tool for creating PostgreSQL database backups in a form of SQL scripts. This database script utility allows you to save metadata of all PostgreSQL database objects as well as PostgreSQL table data as database snapshot. DB Extract scripts PostgreSQL database objects in the correct order according to their dependencies. Flexible customization of the extract process enables you to select objects and data tables for PostgreSQL database dump and tune many other extract options. DB Extract for PostgreSQL includes a graphical wizard that will guide you through the PostgreSQL extract process step by step, and a command-line utility for creating PostgreSQL backups in one-touch. Possibility to extract database objects in the correct order according to their dependencies. Possibility to compress the result script and split it into volumes.
  • 31
    RBackup

    RBackup

    Remote Backup Systems

    RBackup GSuite is an onsite backup solution for securely backing up users data from Google Workspace. RBackup GSuite is a standalone desktop application designed to backup Gmail, Google Drive data, contacts, and calendar data from the Google workspace to an onsite location in an encrypted format. Gmail, contacts, calendar, and Google Drive data are critical for any business, and it is required to protect them from accidental deletion, user errors, ransomware, and data corruption. RBackup GSuite is a one-stop solution to mitigate both internal and external threat. In case if any threat or accidental deletion, you can restore the onsite users data (Gmail / Google Drive / Contacts / Calendar) to Google Workspace or to local machine. RBackup Remote Backup Software works like regular data backup software, but with one important difference. Instead of sending backups to a tape drive or other media attached to the computer it is backing up, RBackup online backup software sends the backup.
  • 32
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
  • 33
    Invantive Data Hub
    Thanks to compatibility with the popular Invantive Query Tool scripting language, you can easily move business processes you have designed on Invantive Query Tool into a server environment. Besides high volume data loads you can also generate reports in Excel and other formats using data from your databases and (cloud) applications. The support for headless mode enables Invantive Data Hub to be started by batch files or from the Windows Task Scheduler. When running Invantive Data Hub in headless mode, you will enjoy the integrated logging features for ease of analysis and auditability. Schedule and run high volume data loads and extractions of cloud applications. Headless and command-line driven for use on servers. Invantive Query Tool-scripting language compatible.
  • 34
    Plixer FlowPro
    Arm yourself with Plixer FlowPro and transform network data into a frontline defense. With precise insights into applications, DNS activities, and more, you won’t just respond, you’ll preempt and neutralize threats. Arm yourself with Plixer FlowPro and transform network data into a frontline defense. Tap into advanced analytics for a comprehensive view of applications and DNS activities, enabling you to respond to and predict potential threats with greater precision. Elevate your defenses against malware, data exfiltration, and DDoS attacks. FlowPro’s specialized monitoring and analysis tools spot anomalous DNS protocol behaviors, providing layers of preventive security. Stop ransomware and malware in their tracks. Actively monitor, detect, and sever links to command and control servers, safeguarding your infrastructure from compromise. Gain insight into encrypted network traffic. See clearly, act decisively, and ensure your network remains uncompromised.
  • 35
    IBM Netezza Performance Server
    100% compatible with Netezza. Single command-line upgrade path. Available on premises, on cloud or hybrid. IBM® Netezza® Performance Server for IBM Cloud Pak® for Data is an advanced data warehouse and analytics platform available both on premises and on cloud. With enhancements to in-database analytics capabilities, this next generation of Netezza enables you to do data science and machine learning with data volumes scaling into the petabytes. Failure detection and fast failure recovery. Single command-line upgrade to existing systems. Ability to query many systems as one. Choose the data center or availability zone closest to you, set the number of compute units and amount of storage required to run, and go. IBM® Netezza® Performance Server for IBM Cloud Pak® for Data is available on IBM Cloud®, Amazon Web Services (AWS) and Microsoft Azure. Deployable on a private cloud, Netezza is powered by IBM Cloud Pak for Data System.
  • 36
    IBM Storage Protect
    IBM Storage Protect is a data backup and recovery software. Storage Protect is part of the software defined storage products in the IBM Storage portfolio. For backup and recovery of SaaS applications, see Storage Protect for Cloud. IBM Storage Protect (formerly IBM Spectrum Protect) provides comprehensive data resilience for physical file servers, virtual environments and a wide range of applications. Organizations can scale up to manage billions of objects per backup server. Clients can reduce backup infrastructure costs with built-in data efficiency capabilities and the ability to migrate or copy data to tape, public cloud services, and on-premises object storage. IBM Storage Protect can also store IBM Storage Protect Plus data, allowing companies to take advantage of their existing investment for long-term data retention and disaster recovery.
  • 37
    IronCore Labs

    IronCore Labs

    IronCore Labs

    IronCore's SaaS Shield is a platform for managing Application-Layer Encryption in cloud software applications. It manages all of the concerns of such a system from key orchestration to rotation to audit trails. And it supports multi-tenant setups and BYOK/HYOK needs. Together with IronCore's other products, meaningfully protected data can still be usable and it can be searched over with Cloaked Search and Cloaked AI.
  • 38
    eperi Gateway
    You alone have full control over the encryption of your data – at any time and definitely without backdoors. All Systems – One Solution. Thanks to the patented template concept you can use the eperi® Gateway for all your (cloud-) applications and adapt it to your data protection requirements. Your employees can continue working as usual, while the eperi® Gateway encrypts data transparently and preserves the central functions of your applications (such as search and sort). Take advantage of cloud applications while staying compliant with the stringent regulations of the financial industry like privacy-preserving analytics. IoT brings forth smart machines and products that collect data independently and automatically. Thanks to encryption, you can ensure data privacy and comply with legislation.
  • 39
    Barac

    Barac

    Venari Security

    Our unique solution works with your existing infrastructure to deliver instant analysis, detection and response to cyber threats carried within your encrypted data. Read our advisory paper, get insight into the encrypted traffic problem and understand why the use of TLS protocols and your existing infrastructure are raising the security risks for your critical data. Then read how our unique solution utilises the latest technology to ensure your business is cyber secure, crypto compliant and delivering ROI. Metadata is extracted from all incoming/outgoing encrypted data packets in real time, and forwarded to the Barac platform for analysis. Unique AI utilising machine learning and behavioural analytics (involving 200+ metrics) detects known threat vectors and abnormal traffic to discover potential threats. Alerts are sent to your specified security team SOC, SIEM or alternative, for immediate response.
  • 40
    DexGuard

    DexGuard

    Guardsquare

    Protecting Android applications and SDKs against reverse engineering and hacking. Android applications and SDKs are easy to decompile using readily available tools. This opens the way for various forms of abuse, including intellectual property theft, credential harvesting, tampering and cloning. DexGuard protects native Android and cross-platform apps and SDKs against reverse engineering and hacking. It hardens apps' code and enables them to defend themselves at runtime. DexGuard is a command-line tool that processes, optimizes and protects Android applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 41
    pdfChip

    pdfChip

    callas software GmbH

    pdfChip is a command-line application for the creation of high-quality PDFs from HTML (taking full advantage of CSS and JavaScript). It supports all HTML features but extends to support CMYK, spot color, XMP metadata, PDF standards, SVG, MathML, barcodes, and more. Capable of generating single and multi-page PDF documents it is ideally suited for high-volume dynamic PDF generation. pdfChip is a command-line application for the creation of high-quality PDFs from HTML, taking full advantage of CSS and JavaScript. pdfChip is based on WebKit technology, it renders your designs quickly and flawlessly into PDF. It allows to creation of fully compliant PDF/X files (for print) or PDF/A files (for archival), in the smallest output PDF size possible. Furthermore, it’s possible to use the exact same HTML and CSS code on the web as well as for PDF generation. pdfChip has a low entry level, as the command-line interface is clear and easy-to-learn.
  • 42
    RevBits Zero Trust Network
    Remote workforce, BYOD assets, and third-party access have created a new security dilemma for organizations. Relying solely upon a VPN as security for remote workers and third-party access is insufficient to protect the network. While VPNs provide a degree of protection through encrypting inbound traffic, their security failure comes through providing full network access to users with no privileged access demarcation. RevBits ZTN encrypts, authenticates, and securely connects external users, over SSL/TSL, to internal network assets and applications to which they have specific access without granting full network access. Moving the network perimeter to the endpoint RevBits Zero Trust Network (ZTN) helps isolate and protect your internal assets. As the network perimeter moves to where the user is, RevBits Zero Trust Network (ZTN) helps isolate and protect internal network assets without the necessity of implementing complicated network segmentation.
  • 43
    Ottomatik

    Ottomatik

    Ottomatik

    Protection against anything that can go wrong. Data centerfires, accidental bad database queries, malicious hackers & more. We get it, accidental drop queries happen. It takes just 2 minutes to undo your mistakes and restore your database whenever you need. Focus on building your software and let us worry about your information storage through automated database backups. Save time with an easy setup that involves copying + pasting a command-line installation to get set up in under 2 minutes. Configure your backup process hourly, daily, weekly and monthly backups, stored securely in the cloud. No more stress from data loss. A 1-click recovery process to download your backup from the database server gets you up and running in no time. Integrate your own storage servers (Amazon S3, Dropbox, Drive, etc), where we will store your backup files, or use our database servers for a small fee.
  • 44
    Palo Alto Networks Panorama
    Panorama™ offers easy-to-implement, centralized management features that provide insight into network-wide traffic and simplify configurations. Create and edit security rules in accordance with your organization’s security policy, across your firewall deployment, from one central location. Gain visibility and actionable insights into network traffic and threats via the Application Command Center (ACC) for comprehensive security management and protection. Leverage the automated correlation engine to reduce data clutter so you can identify compromised hosts and surface malicious behavior more quickly. Manage up to 5,000 Next-Generation Firewalls, or use the Panorama Interconnect plugin to centralize configuration management for tens of thousands of devices. Panorama simplifies security with an intuitive UI that can be used to monitor, configure and automate security management.
  • 45
    SafeStor

    SafeStor

    UbiStor

    An all-in-one solution for backup and disaster recovery, SafeStor ensures that your files and systems are always safe during an incident and recoverable in minutes, not days or even weeks. The combined power of our BaaS and DRaaS services give you peace of mind that your business is protected across complex and varied environments. Our technology monitors your systems in real-time, distinguishing normal activities from suspicious ones like unauthorized encryption. Shrink recovery times significantly by spinning up a protected system locally, directly from the backup storage on to your existing Hyper-V or VMware host. Protect virtual and physical servers, AWS and Azure workloads, workstations, and O365 data all from the same platform. Eliminate expensive equipment and backup software purchases. With SafeStor, you can protect your systems and data at an affordable, predictable, monthly rate based on your usage.
  • 46
    IONOS Cloud Object Storage
    IONOS Cloud Object Storage is a scalable storage service designed for storing and accessing large amounts of unstructured data in cloud environments. It is fully compatible with the S3 API standard, allowing developers and IT teams to manage buckets and objects using existing S3 clients and tools while integrating easily into cloud-native applications and infrastructures. It enables organizations to store virtually unlimited volumes of static or backup data without the need to provision or manage traditional storage volumes. It is built for reliability and high availability, using redundant storage across multiple nodes so data remains accessible and protected even if infrastructure failures occur. It is particularly well-suited for storing backups, archives, and disaster recovery snapshots, as well as handling large datasets used in analytics, machine learning, or digital content platforms.
  • 47
    KoolSpan

    KoolSpan

    KoolSpan

    Talk securely anytime, anywhere. Protect your calls, messages, and files with KoolSpan’s end-to-end encryption. KoolSpan Dome extends the boundaries of your secure network. Stay connected with your colleagues and partners, while your communications and data remain protected from threats and cyber-attacks. Consumer-based products are not focused on security. They are designed for ease of use but compromise privacy. Your metadata is their business. Government, military, and enterprise solutions are designed for security, reliability, ease of use, and complete control of privacy. In an always-connected world, there’s an ever-increasing need to protect users and corporate sensitive data. KoolSpan fortifies its services and tools against cyber attacks. Secure calls, messages, and file sharing between users. Military-grade platform with end-to-end encryption. On-premise private infrastructure for enclosed environments.
  • 48
    B@mbu cloud

    B@mbu cloud

    B@mbu cloud

    Bambú Cloud is a complete software for companies, autonomous and Pymes. With his easy interface, anybody can use his data and work with any platform (PC's or Tablet PC's). In our PDC's (Process Data Center) more advanced and secure in the country. With the most strong security protocols and recovery systems, our Final customers always stay protected. We have the latest encryption techniques and transmission of confidential information and support and monitoring of advanced safety systems of our data processing centers. The design of our system can work continuously on any machine with a Web browser only uncut and bottlenecks due to saturation of the system or peaks. The application has floating aids at the right edge of the screen, aids in each of the panels as well as video tutorials on the web and help home screens. Our technicians and assistants will provide online support via phone and email whenever you need it so that never in doubt on any aspect of the application.
  • 49
    Strongspace

    Strongspace

    Strongspace

    Strongspace puts you in control of your most important files and information. Strongspace is ExpanDrive’s latest product offering for cloud storage and backup focusing specifically on rysnc, which synchronizes files from one location to another while minimizing data transfer by using delta encoding. The system relies on secure links through ZFS and rsync as well as wicp encryption, which provides a high level of security for system users. Through SFTP and other methods, Strongspace developers have created their own API and command-line utility, making data easier to access and control. Strongspace creates images of all files and folders, which allows for the convenient and simple ability to roll back to daily or weekly snapshots of data. Strongspace offers three basic storage plans with limited space and also provides the option of custom plans with upwards of 15TB of storage. With Strongspace, businesses are afforded the benefits of cloud storage at a scalable and custom price.
    Starting Price: $5.99 per user per month
  • 50
    ClamAV

    ClamAV

    ClamAV

    ClamAV® is the open-source standard for mail gateway-scanning software. ClamAV includes a multi-threaded scanner daemon, command-line utilities for on-demand file scanning, and automatic signature updates. ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. Built-in support for various archive formats, including ZIP, RAR, Dmg, Tar, GZIP, BZIP2, OLE2, Cabinet, CHM, BinHex, SIS, and others.