Loading...
Browse 244 privacy tools
Cryptographic solution for outsourcing computation with verifiable results
Cryptographic solution for outsourcing computation with verifiable results
Cryptographic technique for verifying claims without revealing sensitive data.
Cryptographic technique for verifying claims without revealing sensitive data.
Cryptographic technique for secure dataset intersection without revealing data
Cryptographic technique for secure dataset intersection without revealing data
Cryptographic protocol for secure multi-party data analysis without revealing inputs
Cryptographic protocol for secure multi-party data analysis without revealing inputs
FHE solution enabling computation on encrypted data without decryption
FHE solution enabling computation on encrypted data without decryption
Platform for encrypting data in use via confidential computing TEEs
Platform for encrypting data in use via confidential computing TEEs
Bot detection service that verifies human users through challenges
Bot detection service that verifies human users through challenges
VPN service that encrypts internet connections and masks IP addresses
Wi-Fi 6 router with built-in VPN for protecting all network-connected devices
Wi-Fi 6 router with built-in VPN for protecting all network-connected devices
Data discovery and classification platform for GDPR compliance and data protection
Data discovery and classification platform for GDPR compliance and data protection
GDPR Practitioner training cert for Data Protection Officers
GDPR Practitioner training cert for Data Protection Officers
Online training course for GDPR compliance fundamentals and certification
Online training course for GDPR compliance fundamentals and certification
Training course for GDPR compliance using Microsoft 365 tools and features
Training course for GDPR compliance using Microsoft 365 tools and features
Online GDPR employee awareness training with certification exam
Online GDPR employee awareness training with certification exam
Data security and privacy training course for employees
Data security and privacy training course for employees
Interoperability platform for secure peer-to-peer data exchange
Interoperability platform for secure peer-to-peer data exchange
Platform for confidential multi-party data analysis using Intel SGX/TDX TEEs
Platform for confidential multi-party data analysis using Intel SGX/TDX TEEs
Privacy enhancement platform using MPC, TEE, and synthetic data technologies
Privacy enhancement platform using MPC, TEE, and synthetic data technologies
Web-based privacy policy management tool for SMBs to ensure compliance
Web-based privacy policy management tool for SMBs to ensure compliance
Automated partner onboarding system for uRISQ privacy and security solution
Automated partner onboarding system for uRISQ privacy and security solution
Privacy management dashboard for data protection and compliance monitoring
Self-custody digital identity app for secure authentication and authorization
Self-custody digital identity app for secure authentication and authorization
Inter-bank real-time financial crime intelligence network for fraud prevention
Inter-bank real-time financial crime intelligence network for fraud prevention
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance