Database Encryption Sites

Sort
Tool to encrypt databases in SQL Server transparently. Secure SQL Server databases. Any time data is encrypted; it will take a little longer to decipher that data by your network. However, you should not experience any significant reduction in the loading time of your data. Our software is currently the fastest encryption software on the market and we are constantly working on ways to improve...
Rank
1
Vote
Sponsor
0.0
Offering Oracle Database Security and Encryption Software and Standby Databases for High-Availability. For disaster recovery solutions, we offer the Standby Wizard for Oracle, an automated standby database high-availability suite that rivals Oracle's own standby database Data Guard technology. With an inutitive graphical interface, creating and maintaining standby databases for disaster...
Rank
2
Vote
Sponsor
0.0
New: How to transfer and updates objects securely SQL Shield Overview for a Project Manager Download Older "Why use XP_CRYPT and SQL Shield ?" A Project Manager's Perespective (PDF) International versions available: Japanese, Spanish, German, French, Hindi, Traditional and Simplified Chinese SQL...
Rank
3
Vote
Sponsor
0.0
Zero Configuration: no setup or administration needed. No Key Management. Just open database with passphrase and use it as original SQLite database. SQLiteCrypt derives encryption key from user-supplied passphrase and perform transparent encryption/ decryption without any your attention....
Rank
4
Vote
Sponsor
0.0
Delphi Database - BDE Alternative for Delphi and C++ Builder. No BDE (BDE replacement), no DLLs, SQL'92 (DDL and DML), single-user and multi-user (file-server), full compatibility with standard DB-aware controls, strong encryption, BLOBs compression, single-file database, high-speed, embedded...
Rank
5
Vote
Sponsor
0.0
Top Database Encryption Sites (13)
Apteryx utilizes the company's expertise in medical and dental imaging, image processing, data encryption and security, database, data conversion and distributed systems. Apteryx, Inc. is a custom software development company located in downtown Akron, Ohio, central to the Northeast Ohio region. Specializing in the development of custom applications, Apteryx utilizes the company’s expertise in...
Rank
6
Vote
Sponsor
0.0
SSL helps you secure transactions and communications to your website. This protects customers' credit cards, passwords and sensitive data. SSL Certificates activate the built in SSL/TLS security functionality of web servers, browsers and applications. It is the standard security technology to encrypt any browser-to-server communications over https, such as credit card transactions, logins, web...
Rank
7
Vote
Sponsor
0.0
NetLib’s powerful, patented data security platform helps companies manage their encryption needs with a simple, scalable and cost effective solution. NetLib’s powerful, patented data security platform helps companies manage their encryption needs with a simple, scalable and cost effective solution that requires no administrative overhead. The company’s flagship product, Encryptionizer, acts as...
Rank
8
Vote
Sponsor
0.0
They display EDI data streams in familiar forms and translate cryptic transaction set codes into their full description. They also export EDI data into your database system, regardless of manufacturer. They can even create EDI files from your database in many cases. And with the EDI Exchange module they manage trading partner relationships, handle encryption and the secure transport of EDI...
Rank
9
Vote
Sponsor
0.0
Vormetric is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric’s comprehensive high performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database, and application in any server environment. Advanced...
Rank
10
Vote
Sponsor
0.0
"... I am very happy with the SecurEHR system; it is very affordable and easy to use. My staff is very happy with it - they especially like their dashboards that show them their to-dos and email reminders of key events. The system provides me with a bird's eye view of my business operation as well as any level of details I want to look at. Over 3,000,000 minutes of progress notes of all types...
Rank
11
Vote
Sponsor
0.0
Several Oracle Security Services (Consulting, Audit,...) and Solutions provided by Red-Database-Security GmbH. Repscan for Oracle - Repscan helps to find and identify modification in the repository (e.g. caused by database rootkits). Repscan is one of the leading and most accurate vulnerability scanners for Oracle databases. With Repscan it is possible to scan hundreds of databases without...
Rank
12
Vote
Sponsor
0.0
Vormetric is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric’s comprehensive high performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database, and application in any server environment. Advanced...
Rank
13
Vote
Sponsor
0.0
Enforces encryption of stored procedures, user-defined functions, views in SQL Server. All modern versions of SQL Server supported. SQL Server 2014, 2012, 2008 and 2005. DbDefence encrypts database completely including the log. Much faster than XP_CRYPT.
Rank
14
Vote
Sponsor
0.0
Run background checks automatically and securely with Checkr's RESTful API. Checkr uses modern encryption methods to both transfer and store user information. Data is always transferred using Secure Sockets Layer (SSL) and AES-256 bit encryption. Sensitive information like Social Security Numbers are stored encrypted at the database level. Checkr makes pre-employment background screening fast,...
Rank
15
Vote
Sponsor
0.0
In cryptography, MD5 (Message-Digest algorithm 5) is a widely-used cryptographic hash function with a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function, MD4. As an Internet standard, MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. MD5Encrypter.com allows you to input a...
Rank
16
Vote
Sponsor
0.0
Moneykey is here to lend you money when you need. Offering personal short-term, small dollar loans to consumers via a safe and secure online platform. Moneykey, and its third party lenders provides flex-pay installment loans, single-pay loans and lines of credit. You can rely on MoneyKey to protect your information in accordance with industry standards. We have adopted secure socket layer (SSL)...
Rank
17
Vote
Sponsor
0.0
MyDiamo is a comprehensive encryption software package for MySQL and MariaDB. It is simple and usable to secure your open source DB. A valuable feature of MyDiamo is the control of encryption at the column level rather than the entire file structure, enabling encryption of key client data/identifiers without the overhead of encrypting all kinds of irrelevant data/files. In order to fill this...
Rank
18
Vote
Sponsor
0.0
WS_FTP LE: The free way to quickly and easily transfer files of any type and size to any FTP server. More Security: Protect files at rest with OpenPGP encryption and in transit via SFTP (FTP over SSH) or FTPS (AES 256-bit encryption). File integrity checking using SHA-1 or SHA-2. FIPS 140-2 certified. File integrity checking – File integrity checking uses built-in CRC32 and MD5 file...
Rank
19
Vote
Sponsor
0.0
ATLOS provides affordable paperless document management solutions that are perfect for loan, mortgage origination as well as compliant bank software. ATLOS servers are hosted within a tier 4 data center, which offers the highest level of security and redundancy. The data center has 24x7x365 on site security and monitoring. ATLOS uses the latest encryption standards, firewall technology, and...
Rank
20
Vote
Sponsor
0.0