Average Ratings 0 Ratings
Average Ratings 2 Ratings
Description
Enhance your products by integrating the most robust cybersecurity available with our secure digital platform. Our innovative technology, created in partnership with a distinguished group of cryptographers, mathematicians, data scientists, and software engineers, is versatile enough to be integrated into virtually any application. Safeguard your software and create your products within an entirely secure framework. No other platform can provide the same level of security as Cryptoloc, the alternative solution for a secure internet. The proprietary technology of Cryptoloc uniquely merges three encryption algorithms into a singular process, ensuring that every piece of network data is secured by three distinct key pairs, which are stored in separate locations. Our escrow encryption key recovery system ensures that we maintain no knowledge of the data you entrust to us. Your data remains exclusively yours, accessible only to those you designate, thereby guaranteeing complete confidentiality and control. With our platform, you can confidently innovate without compromising on security.
Description
Quixxi is a leading provider of mobile app security solutions that empowers enterprises and security professionals to secure their mobile applications. Our state-of-the-art AI-based app scanner enables quick assessment and recommendations by identifying potential vulnerabilities in mobile apps and providing actionable guidelines based on the Open Web Application Security Project Mobile Application Security Verification Standard (OWASP MASVS).
Quixxi is proud to be the only provider of a patented and proprietary mobile app security solution. Our diversified range of security offerings includes Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Runtime Application Self-Protection (RASP), and continuous threat monitoring.
Our SAAS-based self-service portal is specifically targeted towards large enterprise and government organizations that have a portfolio of applications that are vulnerable to evolving cyber threats, with a primary focus on the BFSI, Healthcare, and IT service provider industries.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$10 per user per month
Free Trial
Free Version
Pricing Details
$29 for One-Off plan
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cryptoloc
Founded
2010
Country
Australia
Website
cryptoloc.com/platform
Vendor Details
Company Name
Quixxi
Founded
2014
Country
Australia
Website
quixxi.com
Product Features
Digital Signature
Audit Trail
Authentication
Auto Reminders
Customizable Templates
Document Analytics
Mobile Signature
Multi-Party Signing
Progress Tracking
Task Progress Tracking
File Sharing
Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support