Dyadic Enterprise Key Management System

Dyadic Security commits to have 10 years of research on multi-party computation with the help of a dedicated research team. The outcome of this dedicated research is a holistic solution enabling its customers to protect the privacy of data. Dyadic Security offers the flagship product virtual HSM (vHSM) compatible with every device and platforms. The company is specialized in varied categories including computer security, cryptography, cyber security, data protection, network security, mobile security, applications security, digital keys and certificates, SSL, passwords protection, PKI, key management, virtual HSM, encryption, keys and credentials protection, and cloud security. The company’s diverse security-related solution offering has enabled its customers to effortlessly secure the data along with managing the entire lifecycle of authentic keys in the enterprise key management space. Dyadic Security was founded in 2014 and is headquartered in New York, US. The company is a pioneer in software-defined cryptography. Dyadic Security commits to have 10 years of research on multi-party computation with the help of a dedicated research team. The outcome of this dedicated research is a holistic solution enabling its customers to protect the privacy of data. Dyadic Security offers the flagship product virtual HSM (vHSM) compatible with every device and platforms. The company is specialized in varied categories including computer security, cryptography, cyber security, data protection, network security, mobile security, applications security, digital keys and certificates, SSL, passwords protection, PKI, key management, virtual HSM, encryption, keys and credentials protection, and cloud security. The company’s diverse security-related solution offering has enabled its customers to effortlessly secure the data along with managing the entire lifecycle of authentic keys in the enterprise key management space.

USP : Dyadic Security offers vHSM, a software security module which can be embedded with a varied range of platform and device. The company’s software is used to manage different application including document signing, SSL certificate, code signing, app-level encryption, database encryption, authentication, certificate authority, PKI infrastructure, and VPN gateways. Dyadic Security offers innovative technology to its customers which remove the single point of failure of security. This is achieved by sharing cryptographic keys over 2 or more servers and carrying out the cryptographic operation without ever recombining them. Dyadic’s clients using software enjoys the benefit of key management irrespective of the location and deployment model as it supports the process of management for every key, site, and cloud.

BUYERS
VENDORS
EXPERTS
1.2
ANALYSTS
 

DYADIC SECURITY detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
1.55
4.20
4.20
Product Features and Functionality
2.20
5.00
3.90
Delivery
1.50
5.00
5.00
Scalability
0.75
4.20
4.20
Support and Services
0.50
4.05
3.60
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

DYADIC SECURITY has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    14 Participants

  • Niche Quadrant

    All-North America

    25 Participants

REGIONS
Middle East and Africa North America
STRENGTHS
  • Product Maturity / Deployment Model
    Hosted
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Applications Served
    Cloud Encryption
  • Product Maturity / Applications Served
    Communication Encryption
  • Product Maturity / Applications Served
    Database Encryption
  • Product Maturity / Applications Served
    Disk Encryption
  • Product Maturity / Applications Served
    File/Folder Enryption
  • Product Maturity / Pre Sales Support
    Software Requirement Specification (SRS)
  • Product Maturity / Breadth and Depth of Product Offerings
    Products Offered
  • Product Maturity
    Support and Services
  • Product Maturity / Scalability
    End Users/Workstations
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Delivery
  • Product Maturity
    Product Features and Functionality
  • Product Maturity
    Scalability
  • Product Maturity / services
    Managed Services
  • Product Maturity / services
    Professional Services
  • Product Maturity / Organization Size
    Large Enterprises
  • Product Maturity / Organization Size
    SMEs
  • Product Maturity / Delivery Models
    Directly
WEAKNESSES
  • Product Maturity / Delivery Models
    Through Partners / Third-Party Vendors
  • Product Maturity / Support and Services
    Level of Support Services
  • Product Maturity / Solutions Offered
    Laptop
  • Product Maturity / Solutions Offered
    Mobile
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Solutions Offered
    Pad
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Solutions Offered
    Other devices supported by the solution
  • Product Maturity / End Users
    Aerospace & Defence
  • Product Maturity / End Users
    BFSI
  • Product Maturity / End Users
    Energy And Utilities
  • Product Maturity / End Users
    Government
  • Product Maturity / End Users
    Healthcare
  • Product Maturity / End Users
    IT & Telecom
  • Product Maturity / End Users
    Manufacturing
See More

Have you EVER used DYADIC SECURITY Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Applications Served
  • Applications Served / File
    Folder Enryption
  • Deployment Model
    Hosted
  • Deployment Model
    On-Premise
  • Pre Sales Support
    Software Requirement Specification (SRS)
  • Applications Served
    Cloud Encryption
  • Applications Served
    Communication Encryption
  • Applications Served
    Disk Encryption
  • Applications Served
    Database Encryption
  • Breadth and Depth of Product Offerings
    Products Offered

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

DYADIC SECURITY Presence in Enterprise Key Management Software

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com