TecSec

www.tecsec.com

The solutions offered here enable; differential access to content, within a document (redaction) down to a period in sentence. Attribute based access is enforced by the use of multiple algorithms for compartmentation and hierarchical access to the objects via cryptography while reflecting the taxonomy of the information owner. At the same time the burden per object is a mere 500 bytes without knowing who might want to retrieve or access the information ahead of time, rather than the limitation of needing to know who, the process offers access by content descriptors; access by what. The resultant is protected data, indifferent to network topography; facilitating transmission as a matter of availability and storage a matter of convenience.

Read more

Reach decision makers at TecSec

Lusha Magic

Free credit every month!

The solutions offered here enable; differential access to content, within a document (redaction) down to a period in sentence. Attribute based access is enforced by the use of multiple algorithms for compartmentation and hierarchical access to the objects via cryptography while reflecting the taxonomy of the information owner. At the same time the burden per object is a mere 500 bytes without knowing who might want to retrieve or access the information ahead of time, rather than the limitation of needing to know who, the process offers access by content descriptors; access by what. The resultant is protected data, indifferent to network topography; facilitating transmission as a matter of availability and storage a matter of convenience.

Read more
icon

Country

icon

State

Maryland

icon

Employees

11-50

icon

Founded

1990

icon

Estimated Revenue

$1,000,000 to $5,000,000

icon

Social

  • icon
  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Vice President , Programs

    Email ****** @****.com
    Phone (***) ****-****
  • Vice President

    Email ****** @****.com
    Phone (***) ****-****
  • Vice President Strategy

    Email ****** @****.com
    Phone (***) ****-****
  • Vice President Business Development

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(16)

Reach decision makers at TecSec

Free credits every month!

My account

Sign up now to uncover all the contact details