Results for: genetic cryptography

Suggested Categories:

Post-Quantum Cryptography (PQC) Software
Post-quantum cryptography (PQC) software refers to cryptographic systems and algorithms designed to secure data against the potential future threat posed by quantum computers. Traditional cryptographic methods, such as RSA and ECC (Elliptic Curve Cryptography), rely on the difficulty of certain mathematical problems that could be solved efficiently by a sufficiently powerful quantum computer. Post-quantum cryptography focuses on developing new cryptographic protocols that are resistant to quantum computing threats, utilizing algorithms based on lattice-based, hash-based, multivariate, or code-based cryptography. This software ensures that data remains secure even in the era of quantum computing, offering a bridge between today's cryptographic practices and the future landscape of quantum-enhanced threats.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.

41 Products for "genetic cryptography" with 1 filter applied:

  • 1
    Apex LIS

    Apex LIS

    Apex Healthware, LLC

    ...HIPAA-compliant Phone app supports patient registration, test order and results notification. We have more than 300 deployments with clients specializing in: Fertility, Genetic testing, molecular testing, Pathology, Toxicology and virtually all other specialties. We have interfaced over 250 different analyzers including interfaces to the leading analyzers in the fields of molecular biology and genetic testing.
    Starting Price: $1500 one-time payment
  • 2
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and...
    Starting Price: $1.25 per month
  • 3
    BreederHQ

    BreederHQ

    BreederHQ

    ...It replaces spreadsheets and disconnected tools with one integrated system. Core features include detailed animal profiles with health records, registries, and genetic test imports (Embark, Etalon, UC Davis); a genetics lab with species-specific analysis (up to 35+ loci), Punnett squares, offspring simulation, and coat color prediction; full breeding lifecycle management with heat cycle projection, visual calendars, and Gantt timelines; offspring tracking with neonatal care, rearing protocols, and digital completion certificates; a buyer CRM with Kanban sales pipeline, lead scoring, and waitlist matching; dual-mode invoicing (manual or Stripe), expense tracking, and contracts with e-signatures; a verified marketplace for breeder discovery with trust badges; a client portal for buyers; and iOS/Android mobile apps. ...
    Starting Price: $29/month
  • 4
    OpaqueVEIL
    ...The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 5
    IDEMIA

    IDEMIA

    IDEMIA

    ...Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. And while connections and transactions are increasingly streamlined and seemingly effortless, we tap into cryptography expertise and leadership to ensure they are safe.
    Starting Price: Free
  • 6
    Douyin

    Douyin

    Douyin

    ...Life coups, food practices, travel strategies, scientific and technological knowledge, news and current affairs, and city information, all the practical content you need is on Douyin! Original musicians, Peking opera actors, non-genetic inheritors, barbecue stall owners, courier brothers, etc., everyone's real life is in Douyin!
    Starting Price: Free
  • 7
    Frisbee

    Frisbee

    Frisbee Agtech Pty Ltd

    ...It helps livestock businesses manage animal records, client relationships, and sales processes in a single, centralized system. The platform allows users to track genetics, performance data, and sale history for each animal. Frisbee also enables the creation of professional sales catalogues and live sales pages with real-time updates. With built-in analytics, producers can gain insights into performance trends and revenue drivers. The platform includes tools for marketing and communication, helping users engage buyers effectively. ...
    Starting Price: $149
  • 8
    Gataca

    Gataca

    Gataca

    ...Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 9
    Vytelle

    Vytelle

    Vytelle

    Vytelle is a precision livestock company reshaping how cattle producers worldwide optimize their herds. Our solutions reduce uncertainty to help you make your most important mating and reproduction decisions. Vytelle SENSE™ is our proprietary individual animal data capture system. It records feed intake and in-pen weight gain measurements to help you identify elite-performing animals expressing economically and environmentally important traits. Our low-contact devices collect key performance...
  • 10
    Afimilk

    Afimilk

    Afimilk

    ...For example, accurate heat detection replaces observations and tail chalking; milk meters automate milking; and sort gates enable efficient and scalable treatments. Afimilk results include boosting herd fertility, improving herd health, optimizing the milking process, increasing milk solids, and improving herd planning and genetics. Afimilk cow monitoring tools provide timely and accurate heat detection for improving herd fertility and optimized lactation intervals. Afimilk has become a global leader in developing, manufacturing, and marketing advanced computerized systems for the modern dairy farm, and for herd management.
    Starting Price: Free
  • 11
    Ennoventure

    Ennoventure

    Ennoventure

    Ennoventure, Inc. is a global leader in SaaS-based brand protection technology, distinguished by its patented invisible signature powered by AI and cryptography, that cannot be replicated or cloned. Trusted by major brands worldwide, our technology is embedded in product packaging seamlessly without any process changes or capital investment. Over 10 billion product packages carry our invisible signatures across various industries, including automotive and industrial spare parts, FMCG, agrochemicals, and more. ...
  • 12
    OneFam

    OneFam

    OneFam

    ...Identify the places your family members have originated from and much more. Learn about your ethnic origins. Trace your family’s origins accross continents. Discover your family’s migration routes. 800,000 genetic markers tested. With a team of over 30 professional genealogists,OneFam enables you to dive deep into your family history on a voyage of discovery across generations.
    Starting Price: $69 per year
  • 13
    masterswift2.0

    masterswift2.0

    mastertrust

    ...Code advanced trading strategies with our powerful scripting language. Search trading charts for specific market trends and patterns. masterswift2.0 can recognize any given pattern within the chart data. Use genetic idea optimization tools for honing your trading skills and become a power trader with masterswift’s online trading technology. Use 10+ online stock trading scanners built by our experts or create your own stock scanner to realize your own trading ideas.
    Starting Price: $0.000014 per order
  • 14
    Performance Livestock Analytics

    Performance Livestock Analytics

    Performance Livestock Analytics

    ...Tap in to Performance Ranch for simplified management and more effective, strategic decision‑making. Introducing our latest solution designed specifically for cow-calf producers. Performance Ranch helps you easily capture health, nutrition and genetic data and track herd inventory in real time. See how the easy-to-use software helps you find insights in your data so you can make more informed, efficient and profitable management decisions. Access this all-in-one tool anywhere, from the pasture to the office. Performance Ranch helps cow-calf producers implement management decisions, track inventory and capture health data.
  • 15
    Keybase

    Keybase

    Zoom Communications

    End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. ...
  • 16
    Tuta

    Tuta

    Tuta

    Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices. Tuta is committed to using renewable energy to power its servers, ensuring privacy while contributing to a greener future.
    Starting Price: €1.20 per month
  • 17
    wolfSSL

    wolfSSL

    wolfSSL

    ...We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 18
    USDX Wallet

    USDX Wallet

    Lighthouse Blockchain Technology

    ...Setting up an account in the wallet takes only a minute. And best of all, there are no fees for payments in USDX. The wallet’s security is implemented at multiple levels. The primary defense is asymmetric cryptography, which is an essential component of cryptocurrencies. Your private key is encrypted and stored safely; only you can decrypt it and perform transactions. The use of distributed ledger technology ensures that all transactions are irreversible. Moreover, your account is linked to your mobile phone number, preventing unauthorized access and enabling two-step authentication. ...
  • 19
    Maiar

    Maiar

    Maiar

    ...Invite your friends and followers to try Maiar and get up to 100% of our commission every time they buy crypto! They'll receive a nice cashback reward, too. At Maiar we help you protect your crypto with the highest level of security via cryptography and privacy features.
  • 20
    LISNR Point
    ...We enable device agnostic transmission and software allowing client control of the experience, transport layer & business model. Flexibility to support encryption, cryptography, key exchange alongside full duplex, multi-channel features, we can enable the most secure transmission method. Faster & more seamless checkout experiences enabled with the combination of range and experience control.
  • 21
    maat.ai

    maat.ai

    MAAT.ai

    Protecting our digital identity is of vital importance, especially in an era like ours, in which every step we take on the internet leaves a record that makes us vulnerable to theft and fraud. That is why maat.ai was born. A platform that uses blockchain, advanced cryptography and high security servers, it allows people to identify themselves and manage their information with confidence and security. By using the maat.ai Business platform, you can share information, in addition to requesting official documents from your employees, customers, suppliers and users in a practical and safe way. We verify the identity of your clients using biometrics and Facial Maatch, as well as the validity of their official documents through Maat Verify. ...
  • 22
    Aztec

    Aztec

    Aztec

    ...Network observers can’t even see which asset or service a transaction belongs to. Aztec is built on PLONK, the new superfast standard in universal SNARK technology, created by our world-class cryptography team. Private transactions are computed in seconds on all devices, and our rollup service saves gas and settles in minutes. Fund and manage your DeFi positions anonymously, and trade them inside the Aztec privacy shield. Program private money, escrow, money streaming, micropayments, your imagination is the limit.
  • 23
    Fluence

    Fluence

    Fluence

    ...Fluence network executes applications without a single coordination center, eliminating potential failure and censorship. Nodes run only applications they are interested in or that are commercially viable. Computations are secured with cryptography and no data leaks to untrusted peers. The network serves a diverse set of computing providers, hardware, and available services. Leverage the power of Web 3 by connecting decentralized storage, identity, and on-chain smart contracts to your Fluence application. Make full-featured apps with community-built integrations to Web 3 networks.
  • 24
    AnyViewer

    AnyViewer

    AnyViewer

    ...AnyViewer, a free yet powerful remote desktop connection software for Windows PCs and Windows Server, definitely, will be your choice that you won’t regret it. For remote connection activity, security can be the first thing that users concern. AnyViewer is secured by Elliptic Curve Cryptography (ECC) encryption, protecting your data from leakage. Developed by strong technical team, AnyViewer can help you to complete stable and fast remote connection from one computer to another PC or multiple PCs at the same time with high image quality. Intuitive and concise interface guide you through remote access computer easily. ...
    Starting Price: $9.90 per month
  • 25
    Akamai MFA
    ...Prevent employee account takeovers and data breaches with phish-proof MFA. Stop MFA bypass attacks with the most secure standard for multi-factor authentication. Make MFA unfishable with end-to-end cryptography. No clunky physical security keys. Simplify adoption with self-service enrollment and an easy smartphone app experience. Get the strongest authentication with FIDO2. Increase security, not hardware. Reduce the workload on administrators. FIDO2 MFA security on any smartphone defeats phishing with frictionless push notifications. ...
    Starting Price: Free
  • 26
    Keyote

    Keyote

    TeskaLabs

    Use your smartphone for secure authentication, next-gen logins, and more. Keyote is built by cyber security veterans, following standard authorized cryptography to give you the strongest possible protection. Everyone has a smartphone today, you don't need to have any additional hardware such as a USB token or smart card to be more secure. Software keys are easy to be copied and hence lost. Keyote stores keys in the phone security chip, effectively preventing their extraction. You must authorize the use of keys with biometry such as a fingerprint, Face ID, etc. ...
  • 27
    Confide

    Confide

    Confide

    ...Messages disappear forever after they are read once, making them as private and secure as the spoken word. Confide’s patented ScreenShield technology keeps your communication safe by preventing screenshots of your messages. Confide utilizes industry-standard cryptography to keep your messages safe and secure. We combine this with a simple and intuitive user experience to provide superior security, with no configuration required. All messages between Confide users are end-to-end encrypted. Encryption keys are generated locally on each device and the private key never leaves the device, ensuring that only the intended recipients can read your messages. ...
    Starting Price: $4.99 per user per month
  • 28
    PicKey

    PicKey

    PicKey

    PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. Instead of memorizing password strings, users simply authenticate with their chosen Vision Secret photo plus a 3D Keymoji selection, and PicKey’s AI recognizes the image even under variations in lighting or angle, mirroring human photographic memory and making login intuitive and memorable while enhancing resistance to brute-force, phishing, and keylogging attacks.
    Starting Price: $4 per month
  • 29
    Acra

    Acra

    Cossack Labs

    ...Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. ...
    Starting Price: $10000 per year
  • 30
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! ...
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB