p≡p closes the most threatening attack vectors for you and your company’s email communication, such as: - Attachment based attacks (ransomware, malicious email attachments, etc.) - URL based attacks (credential phishing, formjacking attacks, etc.) - Business Email Compromise (BEC), a social attack during which the attacker falsifies content, for instance bank account numbers on invoices - CEO fraud, another social attack in which the attacker impersonates the CEO
p≡p proposes easy and simple to implement solutions with a low TCO that offer: - No phishing with company email accounts on employees inside the company (eg. CEO fraud) - No phishing attacks on customers via company email accounts - No business email compromise with company email accounts on employees - No access to and no modification of email content by attackers - Guarantee to the client that only the recipient is able to read his or her email - Full GDPR and audit compliance
No pep.security videos yet. You could help us improve this page by suggesting one.
Kleopatra - Kleopatra is a certificate manager and GUI for GnuPG.
Netumo - Ensure healthy website performance, uptime, and free from vulnerabilities. Automatic checks for SSL Certificates, domains and monitor issues with your websites all from one console and get instant notifications on any issues.
PGP Tool - PGPTool allows you to encrypt and decrypt files. It's free and easy to use.
AppZero - AppZero is a monitoring and migration tool that allows users to keep track of different applications and servers in both simple and complex IT environments.
VeraCrypt - VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
RedGate SQL Monitor - SQL Monitor helps you and your team find issues – before they become problems