Click to Share
 
 
  1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
Filter News
Show All Results
News By Country
News By Tag
Encryption Remove
Related Tags


August 2014
Th We Tu Mo Su Sa Fr
21 20 19 18 17 16 15

encryption Press Releases

  + XML/RSS  



By 3LGTS
Oak Park, August 13th, 2014 - 3Leaf Group, a multi-media resource center for personal and professionaldevelopment recently launched its new IT Division -- 3LG Tech Solutions (3LGTS) -- to offer premiere, next generation database technology.

By PR Artistry
New partnership extends Becrypt’s international footprint, strengthens FCN’s portfolio of security solutions for Federal Government organizations

By ASDReports.com
The new report on Cyber Security, available on ASDReports, defines and segments the global cyber security market into various sub-segments with in-depth analysis and forecast of revenues.

By EMT Distribution
The company partners with Galaxkey to offer email and document security solutions in Middle East

By PR Artistry
– a low cost, secured credit card sized mini computer InfoSec Europe, 29 April – 1 May Earls Court, London Stand: G40

By Information Security Forum
Global Vice President Steve Durbin Will Highlight Key Threats to Expect Over the Next Two Years and Provide Insight Into the Best Ways to Prepare

By NinjaStik
Privacy, security and even online anonymity is possible in seconds with the NinjaStik.

By Cryptsoft Pty Ltd
Cryptsoft Toolkit Enabling Developers to Apply KMIP Standard to RSA® Data Protection Manager Software Achieves RSA® Ready Certification

By StarForce Technologies
SFContent.com provides publishers and corporate customers an easy-to-use tool to protect files and control their distribution over the Internet.

By Ai Applied
Dutch company Ai Applied releases Nonopticon, an online encryption application that secures messaging by turning it into inconspicuous story-style media content.

By Bloombase, Inc.
Bloombase, a Next-Generation Data Security company from Physical, Virtual Data Centers through Big Data, and to the Cloud, today announced it has joined the VMware Technology Alliance Partner (TAP) program.

By Bloombase, Inc.
Bloombase announced that it has been recognized as a certified Dell Technology Partner and becomes one of the first Dell Technology Partners in the data governance solution space to offer encryption security solutions certified with Dell storage.

By Cryptsoft Pty Ltd
Utilising Cryptsoft’s KMIP SDK products Panzura Inc. has enhanced their existing encryption capability with integration of the OASIS Key Management Interoperability Protocol (KMIP).

By monkkee
The German startup monkkee wants to offer Internet users the safest place for their thoughts. Diarists can now create a free private journal on the new web platform monkkee.com.

By VikingVPN.com
VikingVPN represents a new breed of business.  We sell heavily encrypted internet connections, which are critical for maintaining privacy and anonymity online.

By PR Artistry
London, UK, 15 October 2013   Becrypt, a leading supplier of cyber security solutions to Government and industry, has today announced that its DISK Protect data encryption solution has successfully completed a CESG Commercial Product Assurance (CPA).

By BlackSquare Technologies
BlackSquare Enigma is first and only USB real-time encryption/decryption device

By PR Artistry
Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels

By Erik Wegener (wegenerlabs.com)
wegenerlabs just updated its password manager app GoodWallet. v3.0 features a new design, improved iCloud sync and changes under the hood.

By Connect In Private Corp.
Tuesday September 10th, 2013 Panama City, Republic of Panama - Connect In Private Corp. today announced the pre-launch of a new Windows privacy and encryption application.

All Press Releases

By 3LGTS
Oak Park, August 13th, 2014 - 3Leaf Group, a multi-media resource center for personal and professionaldevelopment recently launched its new IT Division -- 3LG Tech Solutions (3LGTS) -- to offer premiere, next generation database technology.

By PR Artistry
New partnership extends Becrypt’s international footprint, strengthens FCN’s portfolio of security solutions for Federal Government organizations

By ASDReports.com
The new report on Cyber Security, available on ASDReports, defines and segments the global cyber security market into various sub-segments with in-depth analysis and forecast of revenues.

By EMT Distribution
The company partners with Galaxkey to offer email and document security solutions in Middle East

By PR Artistry
– a low cost, secured credit card sized mini computer InfoSec Europe, 29 April – 1 May Earls Court, London Stand: G40

By Information Security Forum
Global Vice President Steve Durbin Will Highlight Key Threats to Expect Over the Next Two Years and Provide Insight Into the Best Ways to Prepare

By NinjaStik
Privacy, security and even online anonymity is possible in seconds with the NinjaStik.

By Cryptsoft Pty Ltd
Cryptsoft Toolkit Enabling Developers to Apply KMIP Standard to RSA® Data Protection Manager Software Achieves RSA® Ready Certification

By StarForce Technologies
SFContent.com provides publishers and corporate customers an easy-to-use tool to protect files and control their distribution over the Internet.

By Ai Applied
Dutch company Ai Applied releases Nonopticon, an online encryption application that secures messaging by turning it into inconspicuous story-style media content.

By Bloombase, Inc.
Bloombase, a Next-Generation Data Security company from Physical, Virtual Data Centers through Big Data, and to the Cloud, today announced it has joined the VMware Technology Alliance Partner (TAP) program.

By Bloombase, Inc.
Bloombase announced that it has been recognized as a certified Dell Technology Partner and becomes one of the first Dell Technology Partners in the data governance solution space to offer encryption security solutions certified with Dell storage.

By Cryptsoft Pty Ltd
Utilising Cryptsoft’s KMIP SDK products Panzura Inc. has enhanced their existing encryption capability with integration of the OASIS Key Management Interoperability Protocol (KMIP).

By monkkee
The German startup monkkee wants to offer Internet users the safest place for their thoughts. Diarists can now create a free private journal on the new web platform monkkee.com.

By VikingVPN.com
VikingVPN represents a new breed of business.  We sell heavily encrypted internet connections, which are critical for maintaining privacy and anonymity online.

By Egress Software Technologies
CESG certifies Egress Switch against Desktop and Gateway Email Encryption Security Characteristics offering Foundation Grade assured delivery of IL3 data to insecure endpoints.

By PR Artistry
London, UK, 15 October 2013   Becrypt, a leading supplier of cyber security solutions to Government and industry, has today announced that its DISK Protect data encryption solution has successfully completed a CESG Commercial Product Assurance (CPA).

By BlackSquare Technologies
BlackSquare Enigma is first and only USB real-time encryption/decryption device

By PR Artistry
Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels

By Erik Wegener (wegenerlabs.com)
wegenerlabs just updated its password manager app GoodWallet. v3.0 features a new design, improved iCloud sync and changes under the hood.

By PR Artistry
Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing on the more security conscious organisations

By Connect In Private Corp.
Tuesday September 10th, 2013 Panama City, Republic of Panama - Connect In Private Corp. today announced the pre-launch of a new Windows privacy and encryption application.

By PR Artistry
New solution makes its debut at DSEI 2013 in ExCel, London, on stand number S9-207

By PR Artistry
Joint technology partnership targets government, military and defence markets with future-proof security solutions

By Fast Market Research, Inc.
By Algorithms (AES, RSA), Architectures (FPGA, ASIC), Products (Hard Disk Drives, USB Drives and In-Line Encryptors), Applications, Verticals and Geography

By GarbleMe.com
With the ongoing worldwide revelations about mass blanketed data mining of individuals personal correspondence that at times appears to breach the rights provided under the 4th Amendment.

By Viking Connections LLC
A Small Kansas City Area Company Battles The NSA By Selling Encrypted Internet Connections

By EADS North America
EADS North America's voice encryption device listed on Defence Information Systems Agency's Unified Capabilities Approved Products List

By PR Artistry
London, UK, 10 July, 2013 - Becrypt, a leading supplier of cyber security solutions to Governments and industry, has become the first and only UK supplier of encryption software technology to be listed in the prestigious NATO Information Assurance...

By GoldKey Security Corporation
GoldKey Security Corporation announced the completion of the FIPS 140-2 certification testing requirements for GoldKey Security Kryptors.

By Complete Computers
Complete Computers Providing Cloud Bases Security Services to SMB Market

By WaveSpread Technology Limited
Three Little Sheep is an audio story about Online Security, described the possible threats and solution in a easy to understand way

By WaveSpread Technology Limited
as Hong Kong, free and peaceful city has become victim of military grade internet hacking, and all major internet backbones are being compromised. a group of Hong Kong programmers announce a evolutionary encryption system to protect personal privacy

By Tesline Service Ltd
Do you really care about your data safety? Then Rohos Logon Key is the best solution for Windows authentication. It is your secure key to log in Windows using multiple of tokens, OTP passwords, RFID cards.

By PR Artistry
To lead strategic innovation across secure mobile networking portfolio

By PR Artistry Limited
High achieving partners recognised for outstanding sales performance, excellent customer Service and product innovation gain top honours

By Addonics Technologies
Addonics Technologies has announced the CipherUSB, a family of USB hardware encryption solutions that protect sensitive data stored on hard drives, removable drives, flash media, optical media or in the cloud with bullet proof security.

By EADS North America
ECTOCRYP® BLACK units are now deployed at a Defense Enterprise Computing Center; device helps meet requirements for next-generation secure voice services

By PR Artistry
Panasonic to target Government and military markets with new tablet

By PR Artistry
Innovative secure virtualisation techniques win another award for Becrypt

By Professor John Banzhaf, GWU Law School
In a trend already well underway – but likely to be accelerated by the Boston terrorist incident – more police are moving to encrypt their radios, but the very encryption designed to protect the public could backfire, says an expert

By OWASP San Diego
Free invitation to attend San Diego's next OWASP meeting. Network with peers and enjoy refreshments while learning best practices for secure web application development.

By PR Artistry
Samsung ATIV Smart PC Pro to include Becrypt DISK Protect Windows 8

By Sandstone S.A.
In the hit espionage thriller MÖBIUS actual CryptoPhone secure phones are used by the actors.  They are sold by Sandstone Luxembourg.

By ViaSat
UK-certified encryption hardware adapted for new application

By PR Artistry
RSA Conference 2013, San Francisco, February 25 – March 1 Becrypt Inc. Booth #442

By PR Artistry
Extended tablet support for market leading encryption solution from Becrypt

By GoldKey Security Corporation
GoldKey provides fast, convenient, and secure login to Active Directory across multiple computers with GoldKey Security Tokens.

By Addonics Technologies
Addonics Technologies has announced a pair of RAID Storage solutions with AES 256-bit hardware encryption. The Cipher RAID Rack and Cipher RAID Tower are ideal for securing large volumes of sensitive information, data achieving or video recording.

By FAST!project
The quality of an online second hand shop is also measured on the safety features that have been installed for members. Check data and privacy protection, communication, discretion - and Working Post Portal will convince you.



Page:

Page updated every 10 minutes
Related Hot


  1. SiteMap
  2. Contact PRLog
  3. Privacy Policy
  4. Terms of Service
  5. Copyright Notice
  6. About
  7. Advertise
Like PRLog?
9K2K1K
Click to Share