AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More
Powerful Business Process Automation
With ThinkAutomation, you get an open-ended studio to build any and every automated workflow you could ever need.
When a message is received ThinkAutomation automatically executes one or more Automations. Automations are created using an easy to use drag-and-drop interface to run simple or complex tasks. Automations can perform many business process Actions, including: updating company databases, CRM systems and cloud services, sending outgoing emails, Teams & SMS messages, document processing, custom scripting, integration and much more. Over 100 built-in actions are included, plus ThinkAutomation is extensible with Custom Actions.
FIDO strong authentication, encryption, digital signature engine
StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include:
- A FIDO Engine to support FIDO U2F key registrations/authentications
- An encryption engine to encrypt/decrypt files using AES/TDES keys
- Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA)
- Integration to cloud storage services...
This is a chat system composed of a TCP/IP server daemon and its corresponding java client. You can chat with other peers in clear text or AES password-basedencryption on your own computer network.
The AES encryption and decryption is based on 128 bit key which is reached by padding the resulting SHA256 from your provided password. Simply put, SHA is a checksum that change when a single bit change. When you send a message with a password field, the resulting password checksum is cut at 128 bit which means 16 characters bytes KEY is entered into AES 128 bit encryption and decryption scheme. ...
HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
Jpair is a pure Java Implementation of bilinear pairing, a useful cryptographic primitive underneath crypto schemes such as Identity-BasedEncryption (IBE), Attribute-BasedEncryption (ABE) and many others.
Remove local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Grant time-limited rights on-demand. Control application usage by remote employees through whitelisting and blacklisting.