Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
Galaxkey – Enterprise Cloud Plus
$110.00 – $220.00 / yearEmail Encryption | Electronic Document Signing | Secure File Transfer | Secure Workspace | Providing the highest level of encryption for all your data. Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access.Galaxkey – Enterprise Cloud Plus
Category: Data Security Data-at-Rest Encryption Data-in-Motion Encryption and VPN Endpoint Security Secure File Transfer |Email Encryption | Electronic Document Signing | Secure File Transfer | Secure Workspace | Providing the highest level of encryption for all your data. Galaxkey is a platform that helps you and your organisation to securely store and securely share any kind of data with end-to-end encryption based on authorised identity access. -
PK Encryption
$0.00Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure.PK Encryption
Redefine enterprise data protection with complete administrative control for finding and protecting sensitive data wherever it is stored. PK Encryption protects your business from financial and reputational damage while adding confidence that sensitive information is secure. -
T2 COMMUNICATOR
$999.00T2 COMMUNICATOR secures mobile communication and data-at-rest. Engineered for organizations operating in the critical sectors. T2 COMMUNICATOR covers all critical vectors of attack:- hardware
- OS
- applications
- connectivity
T2 COMMUNICATOR
Category: Data-at-Rest Encryption Data-in-Motion Encryption and VPN Endpoint Security Messaging Security Mobile Communication Security Mobile Data Protection Mobile Device Management Secure File Transfer Zero trust |T2 COMMUNICATOR secures mobile communication and data-at-rest. Engineered for organizations operating in the critical sectors. T2 COMMUNICATOR covers all critical vectors of attack:- hardware
- OS
- applications
- connectivity
-
T2 COMMUNICATOR Dual OS
$0.00T2 COMMUNICATOR Dual is a unique Dual OS secure device for Professional and Professional use, eliminating the need of carrying multiple phones. It facilitates:
- Two completely separated and hardened operating systems
- Encrypted communication
- Secure file share and storage
- Malware, zero-click spyware, tracking, and IMSI-catcher protection
- Complete management of device permissions and policies
- An optional feature of self-hosting for unmatched security
T2 COMMUNICATOR and T2 COMMUNICATOR Dual
are engineered and trusted by organizations operating in critical sectors.
T2 COMMUNICATOR Dual OS
Category: Data-at-Rest Encryption Data-in-Motion Encryption and VPN Endpoint Security Messaging Security Mobile Communication Security Mobile Data Protection Mobile Device Management Secure File Transfer Zero trust |T2 COMMUNICATOR Dual is a unique Dual OS secure device for Professional and Professional use, eliminating the need of carrying multiple phones. It facilitates:
- Two completely separated and hardened operating systems
- Encrypted communication
- Secure file share and storage
- Malware, zero-click spyware, tracking, and IMSI-catcher protection
- Complete management of device permissions and policies
- An optional feature of self-hosting for unmatched security
T2 COMMUNICATOR and T2 COMMUNICATOR Dual
are engineered and trusted by organizations operating in critical sectors.