Data Protection Solutions
ISC’s cybersecurity solutions are based on a highly respected FIPS 140-2 validated cryptographic module (or optional HSM).
Brief Description and Use Cases
|SecretAgent||Ensures the confidentially and integrity of data at rest and data in transit (with optional sender authentication)|
|SecretAgent/TE||Safeguards data in use, data at rest, and data in transit; defends against advanced persistent threads, viruses, and malware|
|SpyProof!||Ensures the confidentiality of data at rest (via virtual drive partitions that provide application-transparent, on-the-fly encryption of all writes and decryption of all reads) – Windows only|