Database Encryption Sites

Sort
Tool to encrypt databases in SQL Server transparently. Secure SQL Server databases. Any time data is encrypted; it will take a little longer to decipher that data by your network. However, you should not experience any significant reduction in the loading time of your data. Our software is currently the fastest encryption software on the market and we are constantly working on ways to improve...
Rank
1
Vote
Sponsor
0.0
Offering Oracle Database Security and Encryption Software and Standby Databases for High-Availability. For disaster recovery solutions, we offer the Standby Wizard for Oracle, an automated standby database high-availability suite that rivals Oracle's own standby database Data Guard technology. With an inutitive graphical interface, creating and maintaining standby databases for disaster...
Rank
2
Vote
Sponsor
0.0
New: How to transfer and updates objects securely SQL Shield Overview for a Project Manager Download Older "Why use XP_CRYPT and SQL Shield ?" A Project Manager's Perespective (PDF) International versions available: Japanese, Spanish, German, French, Hindi, Traditional and Simplified Chinese SQL...
Rank
3
Vote
Sponsor
0.0
Zero Configuration: no setup or administration needed. No Key Management. Just open database with passphrase and use it as original SQLite database. SQLiteCrypt derives encryption key from user-supplied passphrase and perform transparent encryption/ decryption without any your attention....
Rank
4
Vote
Sponsor
0.0
Delphi Database - BDE Alternative for Delphi and C++ Builder. No BDE (BDE replacement), no DLLs, SQL'92 (DDL and DML), single-user and multi-user (file-server), full compatibility with standard DB-aware controls, strong encryption, BLOBs compression, single-file database, high-speed, embedded...
Rank
5
Vote
Sponsor
0.0
Top Database Encryption Sites (13)
Apteryx utilizes the company's expertise in medical and dental imaging, image processing, data encryption and security, database, data conversion and distributed systems. Apteryx, Inc. is a custom software development company located in downtown Akron, Ohio, central to the Northeast Ohio region. Specializing in the development of custom applications, Apteryx utilizes the company’s expertise in...
Rank
6
Vote
Sponsor
0.0
SSL helps you secure transactions and communications to your website. This protects customers' credit cards, passwords and sensitive data. SSL Certificates activate the built in SSL/TLS security functionality of web servers, browsers and applications. It is the standard security technology to encrypt any browser-to-server communications over https, such as credit card transactions, logins, web...
Rank
7
Vote
Sponsor
0.0
NetLib’s powerful, patented data security platform helps companies manage their encryption needs with a simple, scalable and cost effective solution. NetLib’s powerful, patented data security platform helps companies manage their encryption needs with a simple, scalable and cost effective solution that requires no administrative overhead. The company’s flagship product, Encryptionizer, acts as...
Rank
8
Vote
Sponsor
0.0
Backing up your SQL Server databases to the cloud shouldn't be complicated or expensive. SQL Backup Master provides an easy way to upload your database backups to one or more free (or affordable) cloud storage services. It also offers rich compression, encryption, scheduling, recovery, and notification services - so that you can stop worrying and get back to business. Learn about the new...
Rank
9
Vote
Sponsor
0.0
Class II Digital signature certificates holds legal validity in a Court of Law, as provided under the provisions of IT, as this Digital signature certificate is an identity of a person which is verified against a trusted, pre-verified database electronically. It also provides you with a high level of security for your online transactions by ensuring absolute privacy of the information exchanged...
Rank
10
Vote
Sponsor
0.0
Vormetric’s comprehensive high performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database, and application in any server environment. Advanced transparent encryption, powerful access controls, and centralized key management lets organizations encrypt everything...
Rank
11
Vote
Sponsor
0.0
"... I am very happy with the SecurEHR system; it is very affordable and easy to use. My staff is very happy with it - they especially like their dashboards that show them their to-dos and email reminders of key events. The system provides me with a bird's eye view of my business operation as well as any level of details I want to look at. Over 3,000,000 minutes of progress notes of all types...
Rank
12
Vote
Sponsor
0.0
Vormetric is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric’s comprehensive high performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database, and application in any server environment. Advanced...
Rank
13
Vote
Sponsor
0.0
Several Oracle Security Services (Consulting, Audit,...) and Solutions provided by Red-Database-Security GmbH. Repscan for Oracle - Repscan helps to find and identify modification in the repository (e.g. caused by database rootkits). Repscan is one of the leading and most accurate vulnerability scanners for Oracle databases. With Repscan it is possible to scan hundreds of databases without...
Rank
14
Vote
Sponsor
0.0
Enforces encryption of stored procedures, user-defined functions, views in SQL Server. All modern versions of SQL Server supported. SQL Server 2014, 2012, 2008 and 2005. DbDefence encrypts database completely including the log. Much faster than XP_CRYPT.
Rank
15
Vote
Sponsor
0.0
As a former insurance claims professional, I finally did what our industry has recommended and had the contents of my home cataloged and appraised by Asset Verification, Inc. To say that I was pleased is an understatement! Not only did they do our artwork, furniture, sterling silver, china and general household furnishings, but they also did our jewelry, my handbags and shoes and my husband’s...
Rank
16
Vote
Sponsor
0.0
In cryptography, MD5 (Message-Digest algorithm 5) is a widely-used cryptographic hash function with a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function, MD4. As an Internet standard, MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. MD5Encrypter.com allows you to input a...
Rank
17
Vote
Sponsor
0.0
Moneykey is here to lend you money when you need. Offering personal short-term, small dollar loans to consumers via a safe and secure online platform. Moneykey, and its third party lenders provides flex-pay installment loans, single-pay loans and lines of credit. You can rely on MoneyKey to protect your information in accordance with industry standards. We have adopted secure socket layer (SSL)...
Rank
18
Vote
Sponsor
0.0
ATLOS provides affordable paperless document management solutions that are perfect for loan, mortgage origination as well as compliant bank software. ATLOS servers are hosted within a tier 4 data center, which offers the highest level of security and redundancy. The data center has 24x7x365 on site security and monitoring. ATLOS uses the latest encryption standards, firewall technology, and...
Rank
19
Vote
Sponsor
0.0
Record data in the field, and then replay and analyze it later with full or variable speed playback. Let your clients log the data and/or go back and analyze a recorded session with different variables being watched or graphed. Alternately, log data packets or variable watches to excel for in-depth post-analysis. A colorized raw packet list lets you easily visualize and analyze the data on the...
Rank
20
Vote
Sponsor
0.0