Average Ratings 4 Ratings
Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
We have eliminated malware infiltration risks by using QR code transmissions. This has allowed us to deliver a level of transparency that isn't possible via Bluetooth or USB. Find out how to verify every transmission that enters or leaves the Keystone. Secure Element, a proprietary bank-grade security element, ensures that your private keys are never lost from the Keystone. The Secure Element generates an authentic random number for your private key and is essential to ensure your crypto assets are kept in the most secure manner possible. Open source firmware that is compliant with BIP32, BIP39 and BIP44 is also available. Keystone pioneered the first open-source Secure Element firmware for hardware wallets. It allows you to see how private key derived from physical generated entropy (TRNG), and it remains completely contained within the Secure Element. Open source are our hardware wallet application layer (circuit diagram), device schematic (circuit diagram) and bill of materials(BOM).
Description
Comprehensive protection, oversight, and micro-segmentation of workloads are essential for private cloud and on-premises data center settings. This includes fortifying security and providing monitoring capabilities specifically designed for private cloud infrastructures and physical data centers, along with support for Docker containerization. Utilizing agentless protection for Docker containers allows for extensive application control paired with streamlined management. To defend against zero-day vulnerabilities, implementing application whitelisting, detailed intrusion prevention measures, and real-time file integrity monitoring (RT-FIM) is crucial. Additionally, ensuring the security of OpenStack deployments requires thorough hardening of the Keystone identity service module. Continuous monitoring of data center security is vital for maintaining safe operations in private clouds and physical environments. Moreover, enhancing security performance in VMware setups can be achieved through agentless antimalware solutions, alongside network intrusion prevention and file reputation services, which collectively contribute to a robust security posture. Ultimately, effective security measures are indispensable for safeguarding sensitive data within these infrastructures.
Description
Wasabi is a desktop Bitcoin wallet that prioritizes privacy and operates in a non-custodial manner, utilizing an open-source framework that enables trustless CoinJoin transactions. It leverages the Tor network to facilitate these transactions, ensuring that the coordinator cannot compromise the privacy or assets of the users involved. Designed for trustlessness, Wasabi allows participants to engage without needing to rely on the trustworthiness of one another or any external entities. Users maintain complete control over both the sending and receiving addresses through their private keys, while Wasabi's role is limited to orchestrating the amalgamation of inputs into a unified transaction. Importantly, the wallet cannot misappropriate your coins or ascertain the relationship between inputs and outputs, reinforcing the principle of "not your keys, not your bitcoin." With Wasabi, users consistently retain absolute authority over their private and public keys, ensuring that no third parties are privy to this sensitive information. This commitment to user autonomy and security makes Wasabi a standout option for those seeking to enhance their Bitcoin privacy.
API Access
Has API
API Access
Has API
API Access
Has API
Integrations
Bitcoin
BlueWallet
CA Auditor for z/OS
Electrum
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Juicebox
Keystone Wallet
Integrations
Bitcoin
BlueWallet
CA Auditor for z/OS
Electrum
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Juicebox
Keystone Wallet
Integrations
Bitcoin
BlueWallet
CA Auditor for z/OS
Electrum
EnCase Forensic
FortiSandbox
HP-UX
HPE OpenVMS
Juicebox
Keystone Wallet
Pricing Details
$24 one-time payment
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Keystone
Founded
2018
Country
HK
Website
keyst.one/
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cybersecurity/endpoint/hybrid-cloud/data-center-security
Vendor Details
Company Name
Wasabi Wallet
Founded
2018
Country
Gibraltar
Website
wasabiwallet.io
Product Features
Product Features
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance