Cryptosense Description

Get full visibility of your cryptography during development, and a complete inventory in production. You can resolve compliance issues before they are released and identify and fix dangerous vulnerabilities quickly. Cryptosense integrates with your CI/CD. It supports software, hardware, and cloud crypto services. This makes best practice cryptography quick, simple, and easily accessible to developers. Instant visibility to all your cryptography. See it where and when you need. Cryptography is a team sport and your code is just one player. Cryptosense intercepts all crypto-calls made by your application. You can see cryptography coming out of libraries, key managers, config files and hosts. You can see every cryptographic vulnerability in your application without becoming a crypto-expert. Cryptosense integrates seamlessly with your existing toolchain, so you can get results in minutes and not days.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Cryptosense
Year Founded:
2013
Headquarters:
France
Website:
cryptosense.com

Media

Recommended Products
AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
AI-based, Comprehensive Service Management for Businesses and IT Providers

Modular solutions for change management, asset management and more

ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.

Product Details

Platforms
SaaS
Windows
Type of Training
Documentation
Live Online
Videos
Customer Support
Phone Support
Online

Cryptosense Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management Software

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning