CYBERSAFE SOFTWARE LP in Encryption Software

CyberSafe's TrustBroker products, provide advanced troubleshooting options which are used when minimize dowetime in the business-critical applications. The products leverage standards-based protocols and cryptography, to deliver strong authentication and security advantages to critical business applications. Also, the products include a fully scalable, and compliant implementation of the Kerberos protocol.
Features:
- TrustBroker products use standards for security protocols, instead of using proprietory technology
- The products offer Secure single sign-on, reduced sign-on and common authentication features. The products also provide flexible and configurable authentication methods and one or two-factor user authentication
- The products are robust, secure, standards based and easy to modify Kerberos protocol libraries
- They also provide advanced auditing features, to enahnce time to troubleshoot issues

USP : TrustBroker products have the potential to improve authentication and security, even in shared Workstations where single sign-on can't be used. Professional services not required - the CyberSafe TrustBroker Support Services team of experts provide the necessary guidance and support, at no extra cost. CyberSafe's Secure Client for Servers product also caters server to server authentication, provides strong mutual authentication and encryption, while fully leveraging the Kerberos protocol.

BUYERS
VENDORS
EXPERTS
1.8
ANALYSTS
 

CYBERSAFE SOFTWARE LP detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
1.60
1.60
1.60
Services
0.00
5.00
5.00
Focus on Product Innovation
3.75
3.95
3.45
Delivery
5.00
5.00
5.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

CYBERSAFE SOFTWARE LP has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Europe

    24 Participants

  • Niche Quadrant

    BFSI-All

    25 Participants

  • Niche Quadrant

    Healthcare and Life Sciences-All

    24 Participants

STRENGTHS
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Type of Algorithm
    AES
  • Product Maturity / Deployment Model
    IaaS
  • Product Maturity / Deployment Model
    PaaS
  • Product Maturity / Deployment Model
    SaaS
  • Product Maturity / End Users
    Large Enterprises
  • Product Maturity / Deployment Model
    Cloud
  • Product Maturity / Channel of Delivery
    Directly
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Channel of Delivery
    Through Partners / Third-Party Vendors
  • Product Maturity / Solutions Offered
    Cloud Encryption
  • Product Maturity / Solutions Offered
    Communication Encryption (Voice email, and message)
  • Product Maturity / Support and Services
    Data Encryption
  • Product Maturity / Solutions Offered
    Disk Encryption
  • Product Maturity / Solutions Offered
    File/Folder Encryption
  • Product Maturity / Support and Services
    Tokenization
  • Product Maturity / Support and Services
    Others
  • Product Maturity / End Users
    SMEs
  • Product Maturity / Applications Catered
    Application-level encryption
WEAKNESSES
  • Product Maturity / Services
    Managed Services
  • Product Maturity / Services
    Professional Services
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Support and Services
    Level of Support
  • Product Maturity / Professional Services
    Consulting Service
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and education
  • Product Maturity / Type of Algorithm
    Patented inhouse algorithm
  • Product Maturity / Solutions Offered
    Database and Application Encryption
  • Product Maturity / Support and Services
    Data Loss Prevention
  • Product Maturity / Support and Services
    Key Management
  • Product Maturity / Applications Catered
    Application-level tokenization
  • Product Maturity / Type of Algorithm
    Others (RSA, Blowfish, DES)
  • Product Maturity / Applications Catered
    Column-level encryption
  • Product Maturity / Applications Catered
    Data-at-rest encryption
  • Product Maturity / Applications Catered
    Data-in-motion encryption
  • Product Maturity / Applications Catered
    Data-in- process/use encryption
  • Product Maturity / Applications Catered
    File level encryption
  • Product Maturity / Applications Catered
    Virtual machine instance encryption
See More

Have you EVER used CYBERSAFE SOFTWARE LP Products?

Share your experience with potential buyers.

TOP FEATURES
  • Channel for Delivery of Support Services
    Remote Support
  • Deployment Model
    On-Premise
  • Channel of Delivery / Through Partners
    Third-Party Vendors
  • Deployment Model
    SaaS
  • Solutions Offered
    Cloud Encryption
  • Deployment Model
    PaaS
  • Support and Services
    Data Encryption
  • Applications Catered
    File level encryption
  • Deployment Model
    Cloud
  • Applications Catered
    Data-in-motion encryption

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com