Security (hardware / software)

IT hardware security solutions including encryption, biometrics and scanners to reduce fraud and minimise risk within payments and authentication. Browse our list of reputable IT security service vendors on bobsguide to find a solution to safeguard your business and clients.

Company: INSIDE Secure
Inside Secure’s Mobile Payment solution enables YourPay – allowing Issuing banks (and others) to easily deploy their own “Pays”. This allows them to complement their existing assets and customer relationships with a powerful, convenient and secure Mobile Payment solution. Inside Secure has been one of the pioneers of Mobile Payments and has unique experience in ...
Company: INSIDE Secure
Core provides powerful automated Software Application Protection tools applicable across Mobile, IoT, Desktop and Server platforms. Core enables all software developers to automatically protect their programs ensuring that deployed Apps can defend themselves from hackers, pirates, targeted malware, insider betrayal and even hardware errors. Relying on OS protection and sandboxes ...
Company: INSIDE Secure
Every application containing critical sensitive data requires some form of cryptography, either using public key or symmetric methods. To be effective, these keys need to be kept private from potential attackers. If attackers can access the keys, then they can access the sensitive data. With legacy software crypto methods, it is difficult to keep cryptographic keys private because the hacker ...
Company: Druva
inSync provides converged data protection for today’s mobile workforce. For IT, inSync offers rich solutions like mobile data backup, data loss prevention, and tamper-proof audit trails for ...
Company: Druva
With limitless snapshots and infinite retention capabilities, Phoenix builds on Druva’s enterprise trusted, high-performance cloud platform by delivering centralized management of hot, warm and ...