Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Authora's Encrypted Data Gateway Engine, known as "EDGE," is a command-line tool specifically developed for organizations that need to securely transmit significant quantities of data. This solution offers robust protection for critical business information with minimal disruption to current systems. Additionally, EDGE safeguards vast amounts of information residing on servers and backup devices from unauthorized access. Whether handling tape backups, batch FTP transfers, or distributing data to partners, EDGE delivers strong encryption features essential for automated data processing tasks. By integrating EDGE's cryptographic capabilities into their applications and workflows, organizations can effectively manage risk and adhere to compliance requirements. Furthermore, Authora's EDGE adheres to OpenPGP standards, making it a reliable choice for secure data exchange. The application seamlessly incorporates cryptographic functions into existing business processes and operates independently of platform, functioning on both Windows and various UNIX systems, which enhances its versatility and appeal to a broader range of users.
Description
VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments.
Request a demo to experience VaultCore's products:
- Quick, seamless integration with existing technology
- Separation Of Duties (a best practice).
- Powerful automation allows for centralized control of policy
- Increased security of data in motion, at rest, and in use
- Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage
- Simplified compliance, regulatory enforcement
- Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements)
- Reporting capabilities to meet compliance requirements
- Ease in Use
API Access
Has API
API Access
Has API
Integrations
CloudLink
Datacard Secura
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
IBM QRadar SIEM
MySQL
Nutanix AHV
ONTAP
Splunk Cloud Platform
Integrations
CloudLink
Datacard Secura
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
IBM QRadar SIEM
MySQL
Nutanix AHV
ONTAP
Splunk Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$1,118 per year
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Authora
Website
www.authora.com
Vendor Details
Company Name
Fornetix
Founded
2014
Country
United States
Website
fornetix.com/sourceforgedemo
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning