Companies similar to LOCKIN COMAPANY
Sign up to Download

1-30 of 6,706,683 results

  • liapp.lockincomp.com
  • 1
  • 1
Helps to grow your mobile service business by providing source code protection and powerful app hacking protection... Just one click for source code encryption and obfuscation,Anti-Tamper,Unity protection,rooting detection, string encryption, etc.....

Relevance: 34.867756
  • www.phpshield.com
  • 1
  • 1
phpSHIELD started out as a lightweight PHP encoder, originally developed in 2003. In 2006 phpSHIELD joined forces with Inovica Ltd, the developer of SourceGuardian PHP Encoder and we integrated our system with theirs... After a number of years it..

Relevance: 21.889599
  • www.alfasp.com
  • 2
Already have programmers working on a particular solution, and need consulting services only? We provide high-quality services, at an affordable price... Our public products are very customizable, and can serve as a startup solution for your own..

Relevance: 21.145418
  • www.database-encryption.com
  • 1
  • 3
  • 1
DbDefence is a database encryption and data masking software only for SQL Server. Server-side encryption for transparent database and backup encryption (TDE alternative)... We're proud to announce that Becton, Dickinson and Company (NYSE:BDX) is an..

Relevance: 20.898283
  • www.tarsnap.com
  • 2
  • 1
Work on Tarsnap began in September 2006 when the author, Dr. Colin Percival, decided that he wanted a better online backup service than was available at that time. After slightly more than two years of development and private beta testing, Tarsnap..

Relevance: 20.834398
  • www.etebase.com
  • 3
Etebase is open-source which means there is no vendor lock-in and anyone can audit the code and contribute... Etebase is built using end-to-end encryption and modern cryptography, so your users can be sure that only they can access their data... We..

Relevance: 20.81351
  • www.pb-protect.com
  • 10
  • 4
PBProtect provides code protection through generation of an alternate source code for your application. The resulting source code is 100% equivalent to your original source code and has no impact on execution time or maintenance. PBProtect is a..

Relevance: 20.330267
  • www.axantum.com
  • 2
We are now providing Xecrets File Ez [Beta] and Xecrets File Command Line [Beta] for free and with additional premium features, based on the open source GPL AxCrypt[2] code originally written by and now repurposed by Svante... Xecrets File Ez Cli..

Relevance: 20.17706
  • sealapk.cc
  • 1
With privacy features like self-destructing messages, screenshot protection, forwarding denial, and secure downloads, Seal APK is the ultimate multimedia application... Seal APK also offers enhanced privacy and security features, including automatic..

Relevance: 19.835995
  • www.activecrypt.com
  • 1
  • 2
Completely transparent encryption for SQL Server. Solution for vendors and safe database distribution. Complete database encryption and masking... Unique tool for safe usage and distribution of SQL code: stored procedures, user defined functions and..

Relevance: 19.552078
  • www.octogear.com
  • 1
Computer programming agency Octogear is specialized in website and web applications development from scratch to fully functioning app... Our clients websites' security is taken very seriously whether it's a simple Wordpress site or a complex web..

Relevance: 19.011564
  • www.nihaoan.com
  • 1
NH is a leading provider of anti-virus, security and network management software... Ni Hao An specializes in computer security and is your source for all security needs. We handle all areas of security ranging from firewalls, intrustion detection,..

Relevance: 18.989391
  • www.afax.com
  • 6
  • 2
  • 3
Security. Google Fax Services make sure that all your documents remain secure and private thanks to advanced protection and encryption technology... Learn how to send a fax using Google Fax. Just follow these five easy steps and start google faxing..

Relevance: 18.9475
  • genesis-codes.com
  • 1
  • 1
Genesis Code offers advanced public key cryptography algorithms with irreversible computation steps, ensuring private key security in the face of quantum computing threats. In addition to Data encryption, Genesis Codes offer an additional layer of..

Relevance: 18.933598
  • solracinc.com
  • 1
  • 2
Solrac Fire Protection provides code-specific fire sprinkler inspections and repair services for all your fire protection needs... 24-Hours a day, 7 days a week, 365 days a year, we are your trusted source for emergency service, delivering reliable..

Relevance: 18.86784
  • genom.care
In most encryption services, if you forget the encryption key, your data is loss forever. However, in Genom.care we offer you a second chance to recover sensitive data.Our patented method, enables the recovery of information with just capturing a QR..

Relevance: 18.76292
  • secureidsystems.com
  • 1
All Secure ID Systems driver's licenses, badges, NFC, and 2D code, use Triple Data Encryption Algorithm and surpasses all federal security requirements..

Relevance: 18.62382
  • www.privacx.com
  • 2
Browse as usual, and we'll take care of the rest. We bundled our search engine, tracker blocker, and encryption enforcer into one... Get seamless privacy protection on your browser for free with one download: Site Encryption..

Relevance: 18.612234
  • www.deeztek.com
  • 1
  • 1
Deeztek, LLC is a technology firm is based in Maryland, U.S. We provide technology solutions and consulting for various commercial and government organization with focus on security... Free Open Source Unified Secure Email Gateway. Hermes Secure..

Relevance: 18.3754
  • www.atakama.com
  • 1
  • 26
Atakama - Ah-tah-kah-mah - after the Atacama Desert in Chile. Although the Atacama Desert is seemingly void of activity, upon closer inspection it is one of the most unique and beautiful places on Earth. In a similar vein, our encryption solution is..

Relevance: 18.340816
  • veracrypt.fr
VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by..

Relevance: 18.212044
  • www.compumatica.com
  • 1
  • 2
Compumatica is a fully independent and private company with several offices in Europe. All products are developed and built in Europe. We guarantee that the Compumatica products are backdoor-free and customers are allowed to look in the source..

Relevance: 18.165903
  • www.hammer-soft.com
  • 1
Computer evaluation for the most recent software versions, including bug fixes, virus protection, and data encryption...

Relevance: 18.157934
  • www.ranquel.com
  • 1
  • 1
Ranquel develops and delivers data encryption software solutions. We are a trusted leader with proven expertise in protecting sensitive information, and we are the only independent encryption software vendor in Latin America. Ranquel was founded in..

Relevance: 18.10958
  • www.gotploffer.com
  • 1
This code can be found on the letter you received. If you don't have a code, click here... We use high levels of security and encryption standards to keep your personal information safe. All information you provide is kept in strict confidence...

Relevance: 18.085598
  • www.tfhe.com
  • 5
TFHE is an open-source library for fully homomorphic encryption, distributed under the terms of the Apache 2.0 license.The underlying scheme is described in best paper of the IACR conference Asiacrypt 2016: "Faster fully homomorphic encryption:..

Relevance: 18.061468
  • www.paymentpathways.com
  • 1
  • 2
  • 6
Quantum computing is now capable of defeating widespread encryption systems. Cryptographic agility must be integrated into critical infrastructure systems or deployment of quantum-resistant encryption may be delayed. For organizations and self-..

Relevance: 17.993015
  • mailvelope.com
  • 1
  • 1
With a development time since 2012 and a quarter of a million users worldwide, Mailvelope has matured into a proven product. Mailvelope GmbH, based in Germany, offers support and services for open source encryption solutions... The envelope for your..

Relevance: 17.9607
  • www.phpmylicense.us
  • 1
With PHPMyLicense, you can protect your work from being stoled. Manage your licenses even if you are with a Tablet or a Smartphone. PHPMyLicense is totally responsive... Using your Purchase Code or Authentication Token, you will have access to our..

Relevance: 17.74909
  • www.securegion.com
Our code development service for security solutions specializes in creating custom authentication, signature, and encryption features for your systems, delivering high complex tasks with cloud serverless or any required technology..

Relevance: 17.73981