Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

ESCRYPT stands out as a premier provider of IT security solutions tailored for embedded systems, offering a range of consulting services and enterprise security management. Their products are repeatedly selected by OEMs and Tier 1 automotive suppliers for automotive security, highlighting their widespread trust in the market. Achieving lasting security solutions within the automotive sector necessitates a comprehensive, solution-oriented strategy. Curious about how we can assist you? The backbone of nearly all IT security applications lies in cryptographic operations and algorithms, with essential functions like digital signature verification being crucial for secure flash solutions, feature activation, and secure boot processes. To address these demands, ESCRYPT provides an exceptional cryptographic library known as CycurLIB. This library is specifically designed to meet the intricate requirements of embedded systems and has built a strong reputation over the years due to its impressive performance in environments with limited resources. By leveraging CycurLIB, businesses can enhance their security frameworks and ensure robust protection for their embedded applications.

Description

The ITTIA DB suite brings together advanced features for time series, real-time data streaming, and analytics tailored for embedded systems, ultimately streamlining development processes while minimizing expenses. With ITTIA DB IoT, users can access a compact embedded database designed for real-time operations on resource-limited 32-bit microcontrollers (MCUs), while ITTIA DB SQL serves as a robust time-series embedded database that operates efficiently on both single and multicore microprocessors (MPUs). These ITTIA DB offerings empower devices to effectively monitor, process, and retain real-time data. Additionally, the products are specifically engineered to meet the needs of Electronic Control Units (ECUs) within the automotive sector. To ensure data security, ITTIA DB incorporates comprehensive protection mechanisms against unauthorized access, leveraging encryption, authentication, and the DB SEAL feature. Furthermore, ITTIA SDL adheres to the standards set forth by IEC/ISO 62443, reinforcing its commitment to safety. By integrating ITTIA DB, developers can seamlessly collect, process, and enhance incoming real-time data streams through a specialized SDK designed for edge devices, allowing for efficient searching, filtering, joining, and aggregating of data right at the edge. This comprehensive approach not only optimizes performance but also supports the growing demand for real-time data handling in today's technology landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

C
C++
JSON
SQL
XML

Integrations

C
C++
JSON
SQL
XML

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ESCRYPT

Founded

2003

Country

Germany

Website

www.escrypt.com/en

Vendor Details

Company Name

ITTIA

Founded

2000

Country

United States

Website

www.ittia.com/products

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

Alternatives

eXtremeDB Reviews

eXtremeDB

McObject
RaimaDB Reviews

RaimaDB

Raima