Products and solutions

Powerful. Flexible. Scaleable.

Less time to market.

Less


Validian’s unique Application & Data Protection Software, ValidianProtect, is a powerful, flexible, scaleable and rapidly integrated cyber security middleware. It quickly builds, deploys and manages Trusted Distributed Applications on centralized or decentralized networks. This seals the application and the data within, protecting it from threats.

ValidianProtect(TM) product line

The Application & Data Protection Platform protects against network-borne vulnerabilities such as intrusion, impersonation and interception. You can rapidly integrate it into new or existing applications and race to market. Then, change the way you protect yourself on the fly.

The Data Protection Module protects against host-borne vulnerabilities such as memory-scanning and file system scanning. It also provides ready-built capabilities such as flexible control over usage and retraction of data. It offers immediate alerts on the permitted usage, and on the attempted prohibited usage of data.

The Confidential Application Tool Kit comprising a set of programming tools and Software Development Kits (SDKs) that integrate the platform and module within the target application. You can build quickly and with confidence using a robust and competitive set of features and capabilities.


Building blocks for security

Validian has used its ValidianProtect software to build a suite of Anti-Phishing, Anti-Ransomware & Data Protection modules and solutions, which can also be used in combinations to create other ValidianProtect solutions.


Competitive snapshot

FeaturesValidian
Protect
SSL/ TLS PGP
PKI
FirewallsIntrusion
& Threat
Detection
Anti
Virus &
Anti-
Malware
Application
authentication
undefinedundefinedundefinedundefinedundefined
Secure
data usage
undefinedundefinedundefinedundefinedundefined
Encrypted
memory
undefinedundefinedundefinedundefinedundefined
Encrypted
databases
undefinedundefinedundefinedundefinedundefined
Enhanced
message and
content controls
undefinedundefinedundefinedundefinedundefined
End-to-end
encryption
for data
transport
undefinedundefinedundefinedundefinedundefined
Secure
storage
undefinedundefinedundefinedundefinedundefined
Dynamically
changing
encryption
algorithms
undefinedundefinedundefinedundefinedundefined
Dynamically
changing
symmetrical
key encryption
undefinedundefinedundefinedundefinedundefined
Seamless
security
undefinedundefinedundefinedundefinedundefined
Immune to
untrusted
operating
systems
undefinedundefinedundefinedundefinedundefined
Immune to
known
malware &
viruses
undefinedundefined
undefinedundefinedundefined
Immune to
unknown 
malware &
viruses
undefinedundefinedundefinedundefinedundefined
Immune to
known
vulnerabilities &
attacks
undefinedundefinedundefinedundefinedundefined
Immune to
unknown
vulnerabilities
& attacks
undefinedundefinedundefinedundefinedundefined
Tracking &
alerts
undefinedundefinedundefinedundefinedundefined