Alternatives to EndCrypt

Compare EndCrypt alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to EndCrypt in 2026. Compare features, ratings, user reviews, pricing, and more from EndCrypt competitors and alternatives in order to make an informed decision for your business.

  • 1
    Jscrambler

    Jscrambler

    Jscrambler

    Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution provides a robust defense against client-side threats, web skimming attacks, data leaks, and IP theft, empowering software development and digital teams to innovate securely while meeting security and data privacy standards (GDPR, HIPAA, CCPA, among others). Jscrambler’s Code Integrity product safeguards first-party JavaScript through state-of-the-art obfuscation and exclusive runtime protection. Jscrambler’s Webpage Integrity product mitigates threats and risks posed by third-party tags, while ensuring compliance with PCI DSS v4 requirements 6.4.3 and 11.6.1. Jscrambler serves a range of customers, including top Fortune 500 companies, online retailers, airlines, media outlets, and financial services firms.
    Partner badge
    Compare vs. EndCrypt View Software
    Visit Website
  • 2
    DoveRunner

    DoveRunner

    DoveRunner

    DoveRunner - the AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. DoveRunner brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps DoveRunner is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally.
    Starting Price: $129/app/month
  • 3
    QShield

    QShield

    Quarkslab

    Obfuscate your highly valuable source code and protect your sensitive assets thanks to QShield compiler-obfuscator. Protect your applications against static and dynamic analysis. Software running on untrusted environments is at risk of reverse-engineering, an application running on a device that is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, and intellectual property. To prevent unauthorized parties from gaining insight, tampering with or even recovering the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property. 30+ obfuscation schemes are available. Granular control of the protection profile thanks to a file-based policy or comments throughout the code. Build diversification, each compiled application is different with a user-controlled randomness seed. Integrity checks and detection of debuggers, emulators, and hooking frameworks.
  • 4
    OneSpan Mobile App Shielding
    Empower your mobile app to operate safely in untrusted environments without interrupting the end-user experience. Fortify your app against the latest mobile threats without hindering deployment frequency or speed. Strengthen your app's resistance to intrusion, tampering, reverse-engineering, and malware. Add strong data protection controls to support compliance with regulations such as PSD2, GDPR, and more. Serve more customers – even on jailbroken or rooted devices – while reducing risk. Automate app shielding via integrations with your dev teams’ favorite CI/CD tools. Financial institutions lack visibility into the security status of their customers’ mobile devices. The OneSpan application shielding solution protects a mobile banking app from the inside out. It allows the app to securely operate even in potentially hostile environments, such as jailbroken or rooted iOS and Android devices – and only deny service when absolutely necessary.
  • 5
    Digital.ai Application Protection
    Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.
  • 6
    AxCrypt

    AxCrypt

    AxCrypt

    AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.
    Starting Price: $3.63 per month
  • 7
    CryptAway

    CryptAway

    Procenne Digital Security

    CryptAway is an HSM Gateway that provides to creation of a brand-independent Hardware Security Module (HSM) cluster and uses it a t the highest efficiency. CryptAway offers a user-friendly and simple management interface for key management and cryptographic operations while minimizing your operational loads. CryptAway guarantees that all devices in the HSM cluster will always operate at full performance without bottlenecks when high performance is required. Provides the creation of brand and model-independent HSM clusters and manages with optimum performance. With its modular and scalable architecture, it handles increasing process and performance needs without causing any operational load. CryptAway supports international standards, which are frequently used in applications, and helps to move these applications to the Secure Zone with easy integrations.
  • 8
    Dotfuscator

    Dotfuscator

    PreEmptive

    Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning – apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors. Breaches in any of these areas can cause serious revenue, reputation, and brand damage. Sophisticated app dev organizations know that investing in app protection is good risk management. Basic renaming obfuscation isn’t enough. PreEmptive Protection Dotfuscator for .NET provides many layers of protection: multiple forms of obfuscation (renaming, string encryption, control flow, and more) plus active runtime checks (tamper, debug, root, and more). But it’s not just about protection – we design and test all these layers to be sure that they won’t break your app as the runtime platform evolves.
  • 9
    Zimperium MAPS
    Mobile application risks start in development & persist throughout the app’s entire lifecycle, including when running on an end user’s device. Zimperium’s Mobile Application Protection Suite consists of four products with a centralized dashboard to view threats & create response policies. It is the ONLY unified platform that combines centralized visibility with comprehensive in-app protection, combining both inside-out & outside-in security approaches to help enterprises build & maintain secure mobile apps. zScan: Helps organizations continuously discover and fix compliance, privacy, & security issues prior to being published. zKeyBox: Protect your keys so they cannot be discovered, extracted, or manipulated. zShield: Protects the source code, intellectual property (IP), & data from potential attacks like reverse engineering and code tampering. zDefend: Provides threat visibility & on-device ML-based runtime protection against device, network, phishing, & malware attacks.
  • 10
    DashO

    DashO

    PreEmptive

    Professional obfuscation and in-app protection for over 20 years. We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning, apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors.
  • 11
    VideoCrypt

    VideoCrypt

    AppSquadz Software Pvt. Ltd.

    VideoCrypt by AppSquadz is a secure, scalable video streaming and encryption platform designed to safeguard digital content from piracy and unauthorized access. With multi-DRM protection, dynamic forensic watermarking, anti-screen recording, and AWS-powered global delivery, it ensures safe end-to-end streaming across all devices. Ideal for OTT platforms, e-learning businesses, media companies, and enterprises, VideoCrypt offers white-label apps, fast adaptive playback, robust analytics, and seamless VOD/live streaming for professional content distribution. The platform also supports offline access with secure DRM downloads, device-level restrictions, concurrency control, and real-time threat detection to ensure complete content security. With easy integration, customizable UI, and flexible monetization models, VideoCrypt empowers businesses to deliver high-quality video experiences while maintaining full control over their content and revenue.
    Starting Price: $59 for 50 Hrs T&C
  • 12
    Promon SHIELD
    Achieving application security doesn’t have to be difficult or time-consuming. With Promon SHIELD™, your developer team can implement protection to any desktop application, in minutes, without affecting the end-users. Promon SHIELD™ is designed to secure code integrity, data protection, intellectual property and ultimately brand and revenue against targeted malware. With security protections that are infused directly into your application, Promon SHIELD™ protects your desktop apps from both static and dynamic attacks. Since security is embedded into the application, protection is not invasive to the end user’s computer or network, nor does it rely on external libraries or hardware for its protection. Promon SHIELD™ is a security technology that offers multi-layered app protection beyond what the operating system can offer, and beyond what can be achieved by normal best practice and programming by app developers.
  • 13
    ThreatCast

    ThreatCast

    Guardsquare

    After an Android or iOS app is released, security teams and developers often lack visibility into the most common attack vectors and vulnerable parts of their code...until it’s too late. ThreatCast lets DexGuard and iXGuard customers monitor threats in real time, adapt their security configurations and protect apps against suspicious activity and malicious users. Use easy-to-navigate dashboards and custom alerts to detect threat events as they happen. Analyze threat data to respond immediately to attacks or block suspicious users. Prioritize mobile security within the development process, without sacrificing speed-to-market.
  • 14
    CryptPad

    CryptPad

    CryptPad

    CryptPad is built to enable collaboration. It synchronizes changes to documents in real time. Because all data is encrypted, the service and its administrators have no way of seeing the content being edited and stored. Store and manage documents with CryptDrive. Create folders, shared folders, and tags to organize documents. Upload and share files (PDFs, photos, video, audio, etc.). Team drives are shared between users and allow for collaborative organization and fine-grained access controls. CryptPad does not profit from user data. This is part of a vision for online services that respect privacy. Unlike the big platforms that pretend to be "free" while making profits from personal information, CryptPad aims to build a sustainable model funded willingly by users. We offer CryptPad's functionality for free because we believe everyone deserves personal privacy, not just people with disposable income.
    Starting Price: €5 per month
  • 15
    JSDefender

    JSDefender

    PreEmptive

    Cutting-edge JavaScript obfuscation techniques with control-flow flattening, tamper detection and other in-app protection transforms. We would not send our own unprotected code to a remote service controlled by third parties and we would not expect you to either. JSDefender supports major JavaScript frameworks, runtimes, and bundlers including Angular, Node, React, React Native, Webpack and others. Unlike languages like .NET and Java that are compiled to intermediate, stack-based assembly instructions before being distributed in binary form, JavaScript apps are typically distributed in source form. This means that your code is directly visible to anyone with access to the execution environment (like a browser). So, potential attackers can very easily step through the running code using a debugger built into their browser, or use other tools to statically analyze the code for vulnerabilities.
  • 16
    ARMO

    ARMO

    ARMO

    ARMO pioneers a new approach to Cloud Security with an open source powered, behavioral driven, Cloud Runtime Security Platform. ARMOs CADR (Cloud App Detection & Response) solution addresses a major unsolved pain point for organizations running on cloud-native architectures: how to continuously protect dynamic workloads during runtime without overwhelming teams with alerts or interrupting operations. ARMO CADR continuously reduces the cloud attack surface using real-time runtime insights, while actively detecting and responding to threats with true risk context. It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack
  • 17
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 18
    StarForce ProActive

    StarForce ProActive

    StarForce Technologies

    This reliable solution for software protection and licensing is designed to protect games and other end user software against illegal distribution and pirate use, commercial replication and private copying, reverse engineering and cracking. It has fully functional DRM and Steam integration. Advanced software license management to control breach of software license (expiration time, number of activations, etc.). Protection from running the applications under debuggers (the feature works for both user and system levels). Protection from running the applications through remote terminal sessions (protection from remote access). Protection from running the applications on virtual machines (adjustable parameter).
  • 19
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 20
    HomeBank

    HomeBank

    HomeBank

    Designed to be easy to use and to be able to analyse your personal finance and budget in detail using powerful filtering tools and beautiful charts. If you feel that your personal finance require additional level of security, there is plenty of solutions to encrypt data on a computer (TrueCrypt, PGP, native windows bitlocker) for that purpose. A financial application should manage finance data, and a security program should deal with security. Any software must have some scope limits. I think it is better to use external proven and reliable solutions than implement a smokescreen, as the file format used for HomeBank to store data is a simple xml file (so text file), you can review with a txt editor. Adding to this, I do think it make sense and it is more convenient to protect data globally on a computer, instead of being annoyed to fill in a password every time you open a file with an application, your session password and a truly global protection system on your computer.
    Starting Price: Free
  • 21
    BestCrypt
    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 22
    Data Theorem

    Data Theorem

    Data Theorem

    Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease.
  • 23
    Kaspersky Anti-Ransomware Tool
    Kaspersky Anti-Ransomware Tool protects from ransomware at any stage of the attack from delivery to execution using technologies in the multi-layered protection stack. Ransomware attacks someone every 5 seconds. Our free tool provides proven, powerful protection from ransomware like Maze, Conti, REvil, Netwalker, DoppelPaymer, WannaCry, Petya, Bad Rabbit, Locky, TeslaCrypt, Rakhni, Rannoh and many others. It's completely compatible with your current security solutions and will successfully complement them. This lightweight ransomware protection tool uses all the features of cutting-edge Kaspersky endpoint protection technologies, such as cloud-assisted behavior detection to block ransomware and crypto-malware immediately. It also includes a ransomware scanner and acts as a complete solution for ransomware prevention. Kaspersky Anti-Ransomware Tool is capable of blocking both local and remote attempts to encrypt user data.
    Starting Price: $24.37 per year
  • 24
    Cisdem AppCrypt
    Cisdem AppCrypt is an app lock and website blocker rolled into one. You can use it to protect privacy by locking certain apps with a password. You can also use it to improve focus and productivity by blocking distracting sites. With it, parents can protect their children from inappropriate sites. Protect apps - Lock individual apps, such as Photos and WhatsApp - Allow access to your chosen apps only (on Mac only) Block websites - Block specific sites, such as facebook.com - Filter URLs including the keywords you specify - Restrict certain categories of sites, such as social media - Allow access to approved sites only Set schedules - Schedule app locking and website blocking to be active at all times or during specific times - Provide a General Schedule feature - Provide a Custom Schedule feature (on Mac and Windows only) Offer password protection - Require a password unlock apps, unblock sites, or change schedules - Require a password to quit Cisdem AppCrypt
    Starting Price: $19.99 per year
  • 25
    Verimatrix

    Verimatrix

    Verimatrix

    Verimatrix helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports, to sensitive financial and healthcare data, to mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners get to market faster, scale easily, protect valuable revenue streams and win new business. Get to market faster, scale easily, protect valuable revenue streams and win new business. That’s what we do. We help protect your valuable digital content, applications and devices with intuitive, people-centered and frictionless security. Verimatrix  has the leading portfolio for protecting video content for IPTV, OTT, DVB.
  • 26
    Rationalk

    Rationalk

    Rationalk

    A taylor-made agile software to plan, execute and control your projects. We listen carefully to your needs and challenges (from your business side as well as IT side). We look for rational solutions : simple and efficient (even if this implies to use something else than Rationalk). We attach great importance to IT security of our software and to confidentiality of your data. We do our best to limit our impact on the planet (work from home, video meetings, local suppliers, environmental-friendly suppliers). You tell us what is your main obstacle in the field of project management. We evaluate immediatly if Rationalk can solve it. Data exchange is crypted (TLS/SSL) and based on the HTTPS protocol. Informations between your browser and your server cannot be intercepted. Password hacking attemps are automatically identified and user accounts are instantaneously protected.
    Starting Price: $2000.00/year
  • 27
    RedShield

    RedShield

    RedShield

    RedShield has partnered with the no.1 cloud provider AWS to create a next-generation architecture that offers unparalleled DDoS protection as part of RedShield’s service. In a world where the odds are stacked against you, with 50 new vulnerabilities published each day, it can feel like a near-impossible task to stay ahead of cybercriminals. RedShield uses a best-practice operational model with cybersecurity experts, tools, and AI-supported processes to allow our customers to minimize their risk and maximize their cybersecurity resilience. Not only is the cybersecurity battle complex and dynamic, coupled with the high demand & short supply of security & development professionals, but it can also soon become a costly distraction away from core business. RedShield’s service not only solves the people's problem but does so at approx. 10% of the cost of building & running your own in-house web app security team, offering a compelling return on mitigation investment.
  • 28
    Palo Alto Networks Threat Prevention
    Organizations face a barrage of attacks by threat actors driven by a variety of motives, including profit, ideology/hacktivism, or even organizational discontent. Attackers’ tactics continue to evolve, and traditional IPS solutions have not been able to keep pace and effectively protect organizations. To prevent intrusions, malware and command-and-control at each stage of its lifecycle and shut down advanced threats, Threat Prevention accelerates the security capabilities of our next-generation firewalls, protecting the network from advanced threats by identifying and scanning all traffic, applications, users, and content, across all ports and protocols. Daily threat intelligence is automatically curated, delivered to the NGFW and implemented by Threat Prevention to stop all threats. Reduce resources, complexity and latency by automatically blocking known malware, vulnerability exploits, and C2 using existing hardware and security teams.
  • 29
    Keysight Threat Simulator

    Keysight Threat Simulator

    Keysight Technologies

    Threat Simulator never interacts with your production servers or endpoints. Instead, it uses isolated software endpoints across your network to safely exercise your live security defenses. Dark Cloud, our malware and attack simulator, connects to these endpoints to test your security infrastructure by emulating the entire cyber kill chain — phishing, user behavior, malware transmission, infection, command and control, and lateral movement. The world leader in application and security testing, our Application and Threat Intelligence (ATI) Research Center keeps Threat Simulator updated with the latest threats. Our database contains more than 50 million records, and millions of new threats are analyzed and cataloged each month. With continuous updates from our feed, you'll always be able to emulate the most relevant and active cyber security threats and attacks. But curtailing threats also means knowing your enemy.
  • 30
    SandBlast Threat Emulation

    SandBlast Threat Emulation

    Check Point Software Technologies

    Attacks from unknown threats pose critical risks to businesses and are the hardest to prevent. This is why many businesses rely on SOC teams to detect them after breaching their systems. This is an ineffective strategy. Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point’s zero-day protection solutions. Check Point Infinity is a unified security architecture that delivers real-time threat prevention of both known and unknown threats, simultaneously protecting the network, cloud, endpoints and mobile and IoT devices.
  • 31
    Tails

    Tails

    Tails

    Tails is a portable operating system that protects against surveillance and censorship. Tails uses the Tor network to protect your privacy online and help you avoid censorship. Enjoy the Internet like it should be. Shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. Tails leaves no trace on the computer when shut down. Tails includes a selection of applications to work on sensitive documents and communicate securely. Everything in Tails is ready-to-use and has safe defaults. You can download Tails for free and independent security researchers can verify our work. Tails is based on Debian GNU/Linux. Activists use Tails to hide their identities, avoid censorship, and communicate securely. Journalists and their sources use Tails to publish sensitive information and access the Internet from unsafe places. Domestic violence survivors use Tails to escape surveillance at home.
  • 32
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 33
    Propine

    Propine

    Propine

    Propine has a suite of institutional grade, blockchain-agnostic solutions that caters to all digital assets including digital securities, cryptocurrencies, stable coins, NFTs and fiat. At the core of the Propine’s solution is Pro-Tect, an integrated digital asset custody platform that provides the highest levels of certified security and compliant solution for safeguarding multiple asset classes. Our state-of-the-art solutions includes Digital Securities: DASH and PropSS and Crypto Management: CryptClear and DeFi-nity. Through our KYC and AML service, we ensure that you can manage and mitigate regulatory and compliance risks while allowing customers to be onboarded safely and efficiently, each time. We are ISO 270001 certified and have a predictive cybersecurity posture with SOC monitoring, HIPS, UEBA, Insider threat systems. In addition, we are equipped with a mature risk management framework and hardened, modular governance with tamper proof, programmable, policy engines.
  • 34
    Pradeo

    Pradeo

    Pradeo

    Automate on-device mobile threat protection and track device's security compliance. Pradeo Security is a mobile security application that prevents corporate data theft / leakage and fraud. It is available for Android, Android Enterprise, iOS and Chromebooks. The Pradeo Security mobile application delivers an advanced detection of known and 0-day threats coming from mobile apps, network connections and OS configurations. When it detects a threat, it remediates it automatically according to your organization’s security policy. - Ready-to-use mobile security application - Fast deployment - 0-touch configuration - Automatable - Data protection - Multiprofile mode dedicated to Android Enterprise
  • 35
    EMCO MSI Package Builder
    Discover EMCO MSI Package Builder, the premier tool for streamlined repackaging of any installation file into MSI and MSIX. Master every packaging task with a tool that handles EXE to MSI repackaging creates MSI and MSIX packages, and customizes and prepares installations for automated deployment. Whether it's a compact installation or a complex software suite, EMCO MSI Package Builder effortlessly handles the repackaging of any Windows application. Tackle complex installs with ease, including those deploying services and drivers. Say goodbye to guesswork and errors. EMCO MSI Package Builder simplifies the repackaging journey. Just pick your original installation and choose the output format you need. The tool takes over from there, meticulously capturing all installation changes to build your ideal package. Equipped with industry-leading live monitoring technology and a robust kernel-mode driver, EMCO MSI Package Builder tracks system changes as they happen during repackaging.
    Starting Price: $899 one-time payment
  • 36
    Master Packager

    Master Packager

    Master Packager

    Master Packager is an application packaging tool to create and edit Microsoft Windows Installer (MSI) files and repackage other installations to MSI format. Our vision is to make application packaging easy, fast, and affordable for everyone, from application packaging freelancers to small companies and enterprises. * Fast - You will never see "not responding" text in the tool. Modifying large MSIs is effortless. The same goes for repackaging. * High quality - Standardized naming, ICE validation, and .dll/.exe file registration mapping are just a few examples of how this tool will reduce human errors and increases quality. * Simple - The user interface allows new and experienced packagers to start creating packages immediately. * Automation - Capturing, building, and applying templates can be fully automated, making it possible to fully automate repackaging. * Price - Providing the same value or better Master Packager can save you money as it can be up to 10 times.
  • 37
    QANplatform

    QANplatform

    QANplatform

    Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 38
    LIAPP

    LIAPP

    Lockin

    Protect your app Today. LIAPP, the easiest and the most powerful mobile app security solution. Just One-Click, We’ll Take Care of Security So You Can Focus More on Everything Else. Liapp allows you to focus on your business with simple way of protection and helps you succeed in a great mobile service with strong hacking defense and convenient user-oriented hacking reports. Easy Prevent the waste of development resources by being able to receive all the protection functions with just a single APP upload. Strong Helps to grow your mobile service business by providing source code protection and powerful app hacking protection. Visible. Helps to run efficient service by monitoring the users who use your app, the number of users, hacking rates and hacking types. The World Trusts LIAPP LIAPP’s excellent hacking defense is highly recognized by numerous professional organizations worldwide. Selected as major Global Representative Vendor in a report
    Starting Price: $39.99 one-time payment
  • 39
    xx network

    xx network

    xx network

    Introducing the xx network, the first and only quantum-resistant and privacy-focused blockchain ecosystem. Now offering the ultra-secure messaging application, xx messenger. Start using the blockchain of the future, the only Layer One protocol protected against quantum computing attacks. Introducing the first and only messenger app that truly protects communication between sender and receiver. All messages are end-to-end encrypted, and no metadata is ever collected. Powered by the xx network. A new easy-to-use digital currency. Designed to be the most secure and usable digital currency available today. xx messenger keeps all user activity private. No tracking, no profiling, and no surveillance. With end-to-end encryption, of course. Introducing xx messenger. Imagine a world where no one, no one, can read your messages and sell your data. Low-cost, quantum-ready, and metadata-protected. A next-gen currency to protect against next-gen threats.
  • 40
    Rocket Secure Host Access
    Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows.
  • 41
    Irdeto

    Irdeto

    Irdeto

    We provide services and solutions that protect revenue, enable growth and fight cybercrime in video entertainment, video games, and connected industries including transport, health, and infrastructure. Helping companies in a wide variety of industries safeguard revenue, create new offerings and fight cybercrime. Protect your assets, safeguard your operations and innovate with confidence. streaming service with confidence and maximizing your premium ad inventory. Reduce your cost and remove the hassles of maintaining the infrastructure underpinning broadcast and online content delivery. Protect your business models, brand reputation, productivity, and profitability. Irdeto Cloaked CA is the most advanced and most widely deployed cardless conditional access system for broadcast and IPTV operators worldwide. Protect your content, brand, and investments. Irdeto is the preferred security partner to empower a secure world where people can connect with confidence.
  • 42
    ReportMill

    ReportMill

    ReportMill Software

    Running as Java code inside your application, ReportMill seamlessly harvests data directly from any Java dataset, whether EJBs, POJOs (Plain Old Java Objects), Java Collection classes, JDBC ResultSets or any combination of these. This is much more efficient than traditional reporting tools, which often require developers to repackage existing Java datasets as the original SQL query, then force a redundant refetch and some potentially risky inter-process communication. This architecture also provides unique access to custom business logic found in the developer's object model, providing a significant savings by reusing this code instead of forcing a rewrite in proprietary template macro languages. ReportMill is the only reporting tool built on top of a comprehensive page layout application.
    Starting Price: $295 one-time payment
  • 43
    Trellix Application Control
    Advanced persistent threats (APTs) to control points, servers, and fixed devices via remote attack or social engineering make it increasingly difficult to protect your business. Trellix Application Control helps you outsmart cybercriminals and keeps your business secure and productive. Ensure that only trusted applications run on devices, servers, and desktops. As users demand more flexibility to use applications in their social and cloud-enabled business world, Trellix Application Control gives organizations options to maximize their whitelisting strategy for threat prevention. For unknown applications, Trellix Application Control provides IT with multiple ways to enable users to install new applications: User Notifications and user self-approvals. Prevents zero-day and APT attacks by blocking the execution of unauthorized applications. Use inventory search and pre-defined reports to quickly find and fix vulnerabilities, compliance, and security issues in your environment.
  • 44
    Lumen Web Application Firewall
    Lumen℠ Web Application Firewall protects your data, employees and customers with seamless security that deters hackers and cyber-criminals. LumenSM Web Application Firewall delivers crucial web and application protection that helps prevent attacks and reduce costly data breaches and downtime by combining multiple defenses that accurately pinpoint and prevent attacks without blocking your customers. Provides a critical additional layer of protection to your perimeter firewall infrastructure with 24x7 monitoring so you can react quickly and efficiently to threats as they emerge. Identifies leaks of sensitive data—such as credit cardholder information and social security numbers—by inspecting encrypted traffic and detecting and blocking malicious web requests. Analyze current web applications to determine vulnerabilities with an application security review and analysis to identify possible flaws that could harm your website security, resulting in costly downtime for your business.
  • 45
    ThreatBlockr

    ThreatBlockr

    ThreatBlockr

    The only solution that blocks every threat from every path in your network. Networks relying primarily on archaic firewall technology without including other more modern security layers like ThreatBlockr® are easy prey for cybercriminals. Firewalls are easily blinded by encrypted attacks. They’re easily traversed by port forwarding fragmented packet attacks. They’re often misconfigured. They can also get confused by simple extended web and messaging protocols. Side-channel attacks, BYOD, and WFH all compound the problem. Organizations use ThreatBlockr® to gain instant network protection without having to drastically re-engineer their existing security stacks, whether they are on-premise, in the cloud, or both. Fix your security stack by deploying ThreatBlockr® today, and get back to working with the confidence that you’re secure, wherever you are. Enable an ideal protected network while improving firewall efficiency.
  • 46
    R&S Web Application Firewall

    R&S Web Application Firewall

    Rohde & Schwarz Cybersecurity

    R&S®Web Application Firewall (WAF) in combination with a network firewall significantly increases the security level of your company. This keeps you up to date with the requirements of a modern and resilient IT infrastructure. With decades of development and practical experience, our web application firewall solution effectively protects the corporate network against widespread attacks such as zero-day exploits, SQL injections, cross site scripting or Distributed Denial of Service (DDoS) attacks at the application level. Our web application firewall ensures optimal protection of critical enterprise applications, including legacy applications and custom APIs, against complex attacks while considering data protection regulations. As the business world becomes increasingly web-based, web applications play a growing role in enterprises. Cybercriminals are increasingly taking advantage of vulnerabilities in these web applications.
  • 47
    Adversa AI

    Adversa AI

    Adversa AI

    We help you enable AI transformation by protecting it from cyber threats, privacy issues, and safety incidents. We help you understand how cybercriminals could exploit AI applications based on information about your AI models, data, and environment. We help you test your AI application resilience with scenario-based attack simulation by a motivated threat actor with advanced capabilities. We help you audit your AI application integrity with a comprehensive analysis based on robustness-focused stress testing methodology. We’ve developed a new attack on AI-driven facial recognition systems, due to this attack, an AI system will recognize you as a different person.
  • 48
    NEC NeoFace Watch
    Security threats are a growing concern at international and national levels, as well as within commercial organizations. With the threats to international borders, governments are ordering reviews of their security arrangements at airports, seaports and public transportation hubs. Independent testing confirms that NEC’s NeoFace technology provides the most accurate matching capability and is the most resistant to variants in aging, pose angle. NeoFace Watch helps reduce the risk of security threats by integrating face-matching technology with video analytics input. The NeoFace Watch application is a Web-based thin client with an easy-to-use user interface. It is unobtrusive and requires no operator interaction. The application can be easily customized and integrated into existing systems and operational processes. NeoFace Watch software is able to process multiple camera feeds extracting and matching thousands of faces per minute.
  • 49
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 50
    Phantom

    Phantom

    Intelligent Waves

    The Phantom Next Generation, award-winning solution provides the ability for organizations to access foreign points of presence to conduct remote open-source information gathering and research while at the same time protecting organizations and individuals from exposure to foreign intelligence. Intelligent Waves has achieved this by combining the GRAYPATH software-defined obfuscated network with the managed attribution capability of the Phantom platform in a secure but unclassified package. The system uses all the capability of the GRAYPATH network to provide low probability of detection, intercept, and exploitation of application traffic and obfuscate the user’s location while the Phantom platform matches the user’s digital signature with the intended point of presence. The user’s true IP, location, and data usage are obfuscated while user-generated traffic is made to “originate” from a remote point of presence (PoP) or interface server.