Results for: php encryption decryption

Suggested Categories:

Encryption Software
Encryption software allows companies to protect and secure data using cryptography to protect valuable files and sensitive data and enhance security.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Serverless Platforms
Serverless platforms are cloud computing services that allow developers to build and deploy applications without managing the underlying infrastructure, such as servers or virtual machines. These platforms automatically handle the scaling, provisioning, and maintenance of resources, allowing developers to focus on writing code and implementing business logic. Serverless platforms typically provide a pay-as-you-go pricing model, where users only pay for the actual resources used during execution rather than for idle time. Features of serverless platforms include automatic scaling, event-driven architecture, and support for various programming languages and services. Popular serverless platforms are commonly used for web applications, microservices, APIs, and data processing.
Social Networking Software
Social networking software enables individuals and organizations to create, manage, and engage in online communities, allowing users to share content, communicate, and collaborate. These platforms typically include features like user profiles, messaging, status updates, content sharing, and group discussions, facilitating both personal and professional connections. Social networking software is used for a wide range of purposes, from personal socialization to business networking and marketing. These tools enable users to build networks, interact with others, and discover relevant content through their connections and interests.
Forum Software
Forum software is a solution to help organizations, communities, or individuals create, manage, and moderate online discussion boards or forums where users can post content, interact, and engage in conversations. These platforms typically offer features such as user registration, thread creation, topic categorization, private messaging, and moderation tools to ensure a safe and organized space for discussion.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (11) for "php encryption decryption"

22 Products for "php encryption decryption" with 1 filter applied:

  • 1
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    ...It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 2
    OX Guard

    OX Guard

    Open-Xchange

    ...OX Guard was designed specifically with this in mind. This PGP based security add-on for OX App Suite, integrates seamlessly into our existing email app, letting users encrypt and decrypt emails and files easily. There is a growing demand for privacy from users, while at the same time, they are concerned about increased complexity and reduced usability. OX Guard was designed to satisfy these concerns. An easy to use wizard lets users set up OX Guard quickly, with no additional security know-how. After set up users are able to encrypt and decrypt emails and files with just one click, integrating security seamlessly into day-to-day user workflows.
  • 3
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption.
  • 4
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts.
    Starting Price: $1,195 one-time payment
  • 5
    Lockystar

    Lockystar

    Lockystar

    Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.
    Starting Price: $0
  • 6
    Laminas

    Laminas

    Zend Framework

    Laminas is the enterprise-ready PHP framework and components. Components for any PHP application, include dependency injection, event dispatchers, input validation and filtering, pagination and navigation, feed generation and parsing, and much, much more. Build PHP middleware applications, using the PSR-7 and PSR-15 specifications, using a variety of routing and templating options, and the dependency injection container you prefer.
  • 7
    WinMagic SecureDoc
    SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity.
  • 8
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. ...
  • 9
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers. It is not a fork of any other coin. DERO is a homomorphically encrypted protocol that can serve individuals and businesses worldwide, with fast and anonymous transactions, smart contracts, and service models. ...
  • 10
    CZIP X

    CZIP X

    CZIP X

    ...You could make encrypted archives that cannot be decrypted on other devices or by users of the same original device.
    Starting Price: €0.99 one-time payment
  • 11
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. ...
    Starting Price: from $ 1.50 per user/per month
  • 12
    Bitmask

    Bitmask

    Bitmask

    The Bitmask application and its custom branded versions like RiseupVPN are lovingly hand-crafted by a team of paid and volunteer programmers from different countries. Development is principally sponsored by the LEAP Encryption Access Project, an non-profit organization dedicated to defending democracy by protecting the right to whisper. The Bitmask application is designed to have a friendly interface with automatic configuration. You simply start the application, register with the compatible service provider of your choice, and away you go. With Bitmask VPN, all your traffic is securely routed through your provider before it is decrypted and sent on to the open internet. ...
  • 13
    Standard Notes

    Standard Notes

    Standard Notes

    Your notes are encrypted and secured so only you can decrypt them. No one but you can read your notes (not even us). Keeping our app simple means you'll spend less time fighting and more time writing. It's faster and lighter than most notes apps. Our apps are built carefully to optimize overall lifetime and long-term survivability. Standard Notes is free to use on every platform, and comes standard with cross-platform sync and end-to-end privacy.
    Starting Price: $2.48 per month
  • 14
    Investintech PDF Library SDK

    Investintech PDF Library SDK

    Investintech PDF Solutions

    ...Efficient utilization of multi-core CPUs for stream decoding and content rendering purposes achieved by closely following portable document format specification guidelines. Apply electronic signatures (with or without cryptographic security layer). PDF encryption & decryption (a password-based encryption handler). Document structure manipulation (create, delete, move, insert, extract, resize, and rotate pages).
  • 15
    pdfRest API Toolkit Self-Hosted
    ...Watermark PDF, Add to PDF, Query PDF, Convert to PDF, PDF to Images, Convert PDF Colors, Convert to PDF/A, Convert to PDF/X, Compress PDF, Linearize PDF, Flatten Annotations, Flatten Layers, Flatten Transparencies, Merge PDFs, Split PDF, Encrypt PDF, Decrypt PDF, Restrict PDF, Extract Text, OCR PDF, Upload Files, Zip Files. Maintain full control with a dedicated EC2-based RESTful API with scalable performance to meet your needs. Built with Adobe PDF Library, the same technology that powers Adobe Acrobat, and developed by Datalogics, globally-trusted document processing experts for over 50 years, pdfRest has the gold-standard API Toolkit for high-quality PDF processing.
    Starting Price: $0.242 per hour
  • 16
    PrivadoVPN

    PrivadoVPN

    PrivadoVPN

    ...Access geographically restricted content, including on streaming services like Netflix or video services like YouTube, by virtually placing yourself in the correct region. All data sent through your VPN is encrypted at the point of origin, sent through an encrypted tunnel, and only decrypted when it arrives at the intended destination. This protects your data while in transit. Your internet service provider (ISP) may be keeping track of all your online activity, but PrivadoVPN keeps no logs of what you do online and can effectively prevent your ISP from doing the same.
  • 17
    froxlor

    froxlor

    froxlor

    ...Choose per domain which IPv4 and/or IPv6 addresses and which ports should be used. Determine which ports should use SSL and allow customers to store certificates per domain. Save different PHP-configurations and choose per domain which php.ini should be used (FCGI/FPM only). Manage reseller resources and limit what the customers may use in the dedicated customer panel. Store dedicated HTTP, FTP and Mail traffic and view it in interactive graphs. Access all major functions via API to gain full control over your hosting. ...
  • 18
    NETePay Hosted

    NETePay Hosted

    Datacap Systems

    ...Real-time reporting is available 24/7 for Datacap partners and their merchants. Remotely configure settings, pad flows, key injection, and more. Processor-proprietary Encryption methods ensure that card data is encrypted at the sale and decrypted at the NETePay Hosted without additional hops. Reduce card-present fraud with contact and contactless EMV (chip card) certifications for fixed, and mobile devices.
    Starting Price: Free
  • 19
    Teampass

    Teampass

    Teampass

    ...Teampass offers a large set of features permitting you to manage your passwords and related data in an organized way with respect to the access rights defined for each user. Teampass is highly customizable to fit your specific needs and constraints. Teampass secures your data and your users at several levels with encryption. It relies on Defuse PHP encryption library which provides a very secure cryptographic protocol. Teampass provides a lot of options and features permitting you to customize it to your needs. Decide how you want to set up your instance of Teampass to achieve your goals in terms of team sharing. Teampass allows you to fine-tune the user's access rights to the existing Items. ...
    Starting Price: Free
  • 20
    sysPass

    sysPass

    sysPass

    Intuitive, secure, and multiuser password manager. Let sysPass guide you through a bunch of features without any knowledge. Built on top of HTML5 and PHP technologies to offer a better UX. No spaghetti code, just developed to be tested and maintainable. AES-256-CTR for stronger password encryption and RSA to send data securely. Your data will be safe anywhere you store it. Dive into the code audit or improve it, and be confident about how it behaves. It's a powerful web application that provides password management in a secure and collaborative way. ...
    Starting Price: Free
  • 21
    MakeMKV

    MakeMKV

    MakeMKV

    ...Additionally MakeMKV can instantly stream decrypted video without intermediate conversion to wide range of players, so you may watch Blu-ray and DVD discs with your favorite player on your favorite OS or on your favorite device. Reads Blu-ray discs protected with latest versions of AACS and BD+. Preserves all meta-information (track language, audio type).
  • 22
    Passwork

    Passwork

    Passwork

    ...Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators. All data is encrypted using the AES-256 algorithm while being securely stored on your server and managed solely by system administrators. Passwork runs on PHP and MongoDB and can be installed on Windows and Linux, with or without Docker. Key features: - Set custom permissions for vaults and folders - Store passwords in a structured way - Use the search bar, tags and color labels for quick and easy access - Eliminate unsecured, old, weak or compromised passwords - Track all activities and review previously used passwords - Invite teammates to vaults and shared folders - Role-based access control - Integration with AD, Azure AD and LDAP - Custom settings for individual users and roles - Import and export effortlessly
    Starting Price: $480 one-time
  • Previous
  • You're on page 1
  • Next