Companies similar to HARDSEC
Sign up to Download

1-30 of 5,373,054 results

  • www.hardsec.com
  • 2
This approach has been the field of hardware security. Modern processors based on architectures such as x86 and Arm incorporate a range of hardware security features such as ring protection and virtual machine separation that are based on non-Turing-..

Relevance: 26.049412
  • www.nomega.com.sg
  • 1
Virtual Smart Card Solution, in here call "VSC", it uses a smart phone as a security carrier, through the security hardware and communication functions inside the smart phone, and with a dedicated software App,To implement a security products VSC..

Relevance: 21.052124
  • eng.ciotsecurity.com
  • 1
  • 2
  • 1
CIOT is evolving as a 'connected car security specialist corporation' by entering the automobile market that will change our lifestyle starting with the IoT building business. CIOT owns Korea's best security solution and products through an in-depth..

Relevance: 20.794443
  • ic-safety.com
  • 1
  • 1
Microelectronic systems are integrated into all sectors of modern society. Individuals rely on mobile computing, home automation, and smart cars to manage their lives. System builders, government, industry, and the military rely on communication..

Relevance: 20.641693
  • sotasecurity.com
Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data in order to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read..

Relevance: 20.33808
  • attestation.app
  • 2
Devices shipping with Android 9 or later may ship a StrongBox Keymaster implementation, allowing the Auditor app to keep the keys used by the attestation protocol in the dedicated Hardware Security Module (HSM) (such as the Titan M in Pixel devices)..

Relevance: 20.196537
  • www.homesecuritysystemstoday.com
Home security is both the security hardware in place on a property as well as personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, security camera systems, etc. that are installed on a..

Relevance: 19.931025
  • www.hostsymposium.org
  • 22
  • 2
  • 102
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event..

Relevance: 19.926245
  • www.locksmithinpapillion.com
  • 1
Welcome to our locksmith services, based in Papillion, Nebraska. We are a well-established business and have been providing locksmith services and security advice to home owners, tenants, commercial and business properties and vehicle owners for..

Relevance: 19.917562
  • slaydendoor.com
  • 1
  • 1
Slayden Door and Hardware is a Nashville-based company specializing in commercial door and hardware solutions for public and private industries, including healthcare, education, government, hospitality, and retail... In addition to our commercial..

Relevance: 19.87047
  • zerotrustworkshopiccad.github.io
  • 1
  • 18
In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero trust model is based on the principle of "never trust, always verify" and is aimed at eliminating all implicit trust in a system. While..

Relevance: 19.681065
  • compunet.rsmanagement.in
  • 1
  • 4
Compunet was established in 1997 with a vision to provide complete solutions in Information Technology... We are professionally equipped solution provide for All Software,Security, Hardware IT solutions in Mumbai, Suburbs and Thane. We cater to our..

Relevance: 19.573748
  • pugetsoundhardware.us
  • 1
  • 1
Puget Sound Hardware is a local, Woman Owned Business, with a powerful portfolio of industry leading brands and specialized services, offering customized security and access control solutions designed to fit a variety of commercial, medium to heavy..

Relevance: 19.349854
  • www.excellencet.com
Hardware: traditional hardware products, also known as "hardware". It refers to gold, silver, copper, iron and tin. After manual processing, it can be made into works of art or metal devices such as knives and swords. Hardware in modern society is..

Relevance: 19.256523
  • www.o-log-n.com
  • 1
  • 1
Founded in 2011, OLogN Technologies is a research and development company focused on developing ground-breaking security technologies aiming to curb both malware impact and phishing threats in both consumer and enterprise environments... To allow..

Relevance: 18.760689
  • antmicro.com
  • 1
  • 1
Antmicro is a software-driven tech company developing edge computing systems for various branches of industry, such as robotics, defence, civil security, computer vision, broadcasting, as well as the Internet of Things. With cross-competence in..

Relevance: 18.63929
  • www.jordex.ca
  • 2
  • 1
At Jordex Solutions we provide a wide range of computer based services for small to medium businesses as well as individuals in the local Montreal area... We are skilled in many aspects of computers, from networking to security and even the more..

Relevance: 18.548098
  • tsvcis.org
  • 1
  • 1
In 2009, the TSVCIS was created by National Security Agency (NSA) and Naval Research Laboratory (NRL), based on STANAG4591 MELPe... The Tactical Secure Voice Cryptographic Interoperability Specification (TSVCIS) is variable data rate system that is..

Relevance: 18.535208
  • www.systemservicesintl.com
  • 2
  • 1
  • 1
Systems Services International, LLC (SSI) is a minority-owned technical support and consulting firm that was established in 1994. SSI specializes in HP ITANIUM, ALPHAserver, and VAX hardware, software, and connectivity services for OpenVMS, Tru64..

Relevance: 18.120335
  • ethertrust.com
  • 5
EtherTrust is a spin-off from research carried out at major research institutes (Telecom ParisTech) and French Universities (University Paris 6). We won various awards such as the Oseo Anvar (from the French Research and University Ministry) and the..

Relevance: 18.070835
  • nysystemsllc.com
  • 1
  • 1
One of the most unique services offered by New York Systems & Security, LLC. is our on staff licensed locksmiths and safe technicians. With over 30 years of security industry experience we provide locksmith services that span from changing and..

Relevance: 17.937422
  • buslink.com
  • 1
  • 1
eSATA as an alternate connection to bypass USB Threat or where USB is disabled as a security policy... Highest level of security with 512-bit AES Colateral 2FA Two-factor Authentication perfect for high security demand... Two unique hardware keys..

Relevance: 17.828022
  • calenderrdlocksmitharlington.com
  • 1
Calender Locksmith Arlington provide full car locksmith service such as: car key made, car lockouts, transponder chips and more... Calender Locksmith Arlington provide residential locksmith service such as: Re-Key Locks, Home Lockouts, Rekey..

Relevance: 17.788324
  • machinanetworks.wordpress.com
  • 2
What you get from Machina Networks is specialization in Computer Hardware, Software, Security, Virtualization Software such as Vmware and Microsoft Hyper-V. Hardware repairs and Upgrades, Software Updates and Programming with C# and Powershell..

Relevance: 17.77316
  • www.morello-project.org
  • 4
Morello is a research program led by Arm in association with partners and funded by the UKRI as part of the UK government Digital Security by Design (DSbD) programme. It defines a new prototype security architecture based on CHERI (Capability..

Relevance: 17.732103
  • www.kootkey.com
As KootKey is designed based on as per the specifications and standards of Fido Alliance , it works with all the web services which use the Universal Second Factor Authentication... Kootkey is a USB based Universal Second Factor Authentication..

Relevance: 17.729212
  • www.appliedbiometrics.com
  • 1
  • 3
  • 3
Applied Biometrics GmbH has a long-time experience in information and biometric technologies such as fingerprint, face and voice recognition. Integrated in a worldwide network of experts, Applied Biometrics operates on the cutting-edge of scientific..

Relevance: 17.722586
  • bestvaluesecurity.co.uk
  • 2
  • 1
Best Value Security Ltd is a private limited company registered in England and Wales. Our company registration number is 10651411 and our VAT registration number is 322 0239 54... At Best Value Security, we offer an extensive range of electronic..

Relevance: 17.651669
  • www.assuredlocks.com
  • 1
  • 1
Assured Security Locksmith and Hardware Company, is one of the tri-state's top providers and installer of electronic locks and security systems... Founded in 2004 as a security company, Assured Security Locksmith & Hardware Co., offers electronic..

Relevance: 17.606127
  • www.homeplusindustry.com
  • 1
HOMEPLUS Hardware Industry Co., Limited has always devoted to research and develop glass hardware. We have based our production on a complete set of process, such as product design, tooling development, casting, machining, polishing, testing,..

Relevance: 17.604843