Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.
Description
data² is an enterprise analytics and decision-intelligence platform powered by AI, aimed at integrating disparate data sources to create clear and understandable insights for intricate operational settings. Central to its design is explainable AI (eXAI), which empowers organizations to grasp not only the predictions made by an AI model but also the rationale behind those predictions, ensuring there is traceable evidence supporting each suggestion. The core offering, reView, compiles data from various organizational systems and converts it into a cohesive intelligence framework, enabling the analysis and visualization of relationships among datasets. This method facilitates the swift interpretation of extensive and complicated datasets while ensuring complete traceability to the original data sources. Furthermore, it prioritizes "hallucination-resistant" AI, ensuring that conclusions are based on verifiable data instead of obscure model outputs, thus fostering greater trust in the insights provided. As a result, organizations can make more informed decisions backed by reliable data rather than speculative analysis.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
TecSec
Country
United States
Website
www.tecsec.com
Vendor Details
Company Name
data²
Founded
2023
Country
United States
Website
www.data2.ai/
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection