Tech Offer/Tech Need
Select

Technology Offers ( Infocomm - Security & Privacy )

Next Generation Web Security Platform

Our platform is a set of core technologies designed and built internally by our team of security researchers and engineers over many years to provide the next...

Read More

Blockchain Technology for Food

This technology tracks and traces materials and products using the blockchain database to store information gathered from all the actors that take part in the food...

Read More

Network Data Filtering Engine / Appliance

This software engine and appliance allows filtering of data content in wire speed of up to 100Gbps with distributed design. Data content can be input...

Read More

The Bluetooth Padlock Designed To Provide Insights On Your Assets

Keys have been used to unlock padlocks for ages and does not allow easy sharing of assets. This technology just made padlocks smarter...

Read More

Integrated Framework to Protect Application on Binary Level

There are times when passwords are exposed, apps are forged and repackaged, malicious code is inserted to disassemble, decompile, and debug...

Read More

Mobile App Security Solution

A Gartner study suggests that by 2017, over 75% of apps will fail basic security testing primarily because of app misconfigurations. Over the last one year, we've...

Read More

Method and System for Collaborative Security Key Generation for Ad-hoc Internet of Things (IoT) Nodes

Security of the IoT nodes are increasingly becoming an important and critical challenge to solve...

Read More

Anti-Drone Solution

Commercially available Anti-Drone solutions usually use jammer (jamming the frequencies used by the drones to make the drone crash or go away), net (by another drone or from the...

Read More

System and Methods for Distributed Data Storage

This invention relates to distributed data storage systems comprising highly recoverable and reliable data storage and encoding methods.Specifically,...

Read More

Motion Activated Security Camera With Image Processing

The present invention pertains to a security system that is uses image processing functions for motion detection. Two consecutive frames from the...

Read More

Single Sign-On, Access Management, Data Encryption and Rights Management for the Cloud

Our Disruptive Encryption Key Management Provides Effective Security and Privacy in the Security...

Read More

Recognition of Ships for Long-term Tracking

Tasks of naval forces are more frequently taking place in coastal environments. Such environments introduce specific challenges in building an operational...

Read More

Pages