Products

Use a secure cloud environment based on cryptographic hardware (HSMs) to keep your data and encryption keys safe. Neither the service provider or an external attacker will be able to access your private information.
More information >


Processs sensitive information in unrelaiable environments (e.g. the cloud) directly operating with encrypted data by means of homomorphic encryption algorithms (SPED).
More information >

 

FacebookTwitterGoogle+LinkedIn