Passwork
Passwork is a self-hosted corporate password manager built for organizations that take security seriously. Designed and headquartered in Barcelona, Spain, Passwork meets GDPR, NIS2, ENS, and other European regulatory standards by default.
Every password and credential lives exclusively on your own server. A double-layer AES-256 encryption model — applied on both the server and client sides — combined with zero-knowledge architecture ensures your data never leaves your infrastructure. System administrators retain full, uninterrupted control.
Passwork holds ISO/IEC 27001 certification. Enterprises rely on it for secure password sharing, privileged access management, and centralized credential governance — all without exposing sensitive data to third-party systems.
Learn more
Proton VPN
Secure your organization from costly data breaches while meeting essential compliance requirements, such as ISO 27001, GDPR, and HIPAA. Our software-based VPN solution is easy to deploy alongside your existing systems, giving you a powerful and adaptable tool for securing your enterprise network.
Our VPN Professional plan allows your team to connect securely to your local networks and cloud-based services. And with granular segmented control over who can connect to dedicated VPN servers and Gateways (logical groupings of dedicated servers), you can ensure your staff can access the resources they need (but only what they need).
All of our business plans use robust industry-standard AES-256 or ChaCha20 encryption to ensure your data remains secure. You can further strengthen your organization's security with enforced two-factor authentication (2FA) and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning.
Our global high-performance (mainly 10 Gbps) server network is one of the largest in the world, and is part of the trusted Proton ecosystem — a suite of fully open source, end-to-end encrypted services built by the creators of Proton Mail and designed specifically to keep your business secure.
Learn more
F5 BIG-IP SSL Orchestrator
Malicious entities exploit SSL/TLS encryption to conceal harmful payloads and evade security measures. To shield your organization from potential threats, it is essential to employ security solutions capable of efficiently inspecting encrypted traffic on a large scale. The BIG-IP SSL Orchestrator offers robust decryption for both incoming and outgoing SSL/TLS traffic, allowing for thorough security inspections that reveal dangers and thwart attacks before they can occur. Enhance your infrastructure and security investments by utilizing dynamic, policy-driven decryption, encryption, and traffic management through your security inspection tools. Safeguard against outbound traffic that may spread malware, steal data, or connect to command-and-control servers to instigate attacks. By decrypting incoming encrypted traffic, you can confirm that it does not contain ransomware, malware, or other threats that can lead to breaches, infections, and security incidents. Additionally, this approach helps eliminate new security blind spots and provides increased flexibility without necessitating significant architectural modifications. Overall, maintaining a proactive stance on encryption inspection is essential for comprehensive cybersecurity.
Learn more
Randtronics DPM easyCipher
Randronics DPM easyCipher offers Transparent Data Encryption (TDE) that provides lock-box style protection for files, folders, and databases. This encryption is seamless, as it automatically decrypts the contents for users with proper authorization. Similar to a secure lock-box, TDE-protected items are in a state of either being locked or unlocked. DPM easyCipher operates as a centralized, policy-driven encryption management system, enabling organizations to unify their encryption strategies by establishing and overseeing encryption policies that can be applied to any server or laptop with a DPM easyCipher agent installed. This solution ensures that all files and folders on both servers and laptops are safeguarded. Environments that benefit from DPM easyCipher’s protection include database servers, web/application servers, and file servers. Additionally, DPM easyCipher can either supplement or substitute the TDE solutions offered by database vendors to enhance the security of their database products. Furthermore, easyCipher is capable of securing sensitive information that exists outside of traditional database environments.
Learn more