Products

Our cryptographic capabilities enable us to address the problems of ransomware. For information please fill in the contact form and we will get back to you shortly.

  • Detect: Detects live ransomware attacks, discovers the keys and salts used in the attack, and enables you to recover your infected data.
  • Catch: Uses cryptography to detect and prevent data exfiltration
  • Hawk: Enables reporting with privacy for entities that have been hit by ransomware
  • *Required Fields.

    Valid.
    Please provide your name.
    Valid.
    Please provide a valid email address.
    Valid.
    Please provide some details about your inquiry (e.g. questions or comments).

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.