Acra provides application level encryption, masking, tokenisation, access control, database leakage prevention, and intrusion detection for modern data-processing apps.| Cossack Labs
Zero Knowledge protocols are often used for authentication, as they allow two parties to verify whether they share the same secret without revealing it. We explain different use cases and how to use them on practice.| Cossack Labs
Integrating encryption and data masking for sensitive data stored in MySQL cluster. A combination of transparent SQL encryption via AcraServer and encryption API via AcraTranslator makes Acra fit for complex solutions.| Cossack Labs
This Privacy Policy explains how your personal information is collected, used, and disclosed by Cossack Labs Limited website(s)| Cossack Labs
This Cookie Policy describes how your personal information is collected, used, and shared when you visit https://www.cossacklabs.com/ and all its subdomains.| Cossack Labs
Protecting data signals transmitted over the air between power distribution stations and central dispatch system.| Cossack Labs
Long-term cooperation with the [REDACTED] company resulted in refined security practices that matched the evolution of their B2B platform. We enabled transition from reactive "firefighting" to a proactive security posture, while simplifying security processes and building security defences.| Cossack Labs
When a bank launches an entirely new banking application, it necessitates a thorough mobile security assessment, diligent efforts to ensure financial transaction security and tailored fraud prevention measures.| Cossack Labs