Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Get your tickets, pick your schedule and share with friends!
Need help using Sched?  Click here
View analytic
Thursday, November 19 • 11:30am - 12:30pm
BlackSquare Technologies

Log in to save this to your schedule and see who's attending!

Limited Capacity seats available

Session Title: "Hardware Encryption Solutions to Protect Your Data!"

Session Description: Here, you will see just how simple it really is to securely encrypt confidential data. Enigma is hardware encryption-your password is stored securely inside Enigma, and NOT on your computer's hard drive nor in the operating system.

Presenters
avatar for Robert Fleming

Robert Fleming

Founder and President, BlackSquare Technologies

Host Companies
avatar for BlackSquare Technologies

BlackSquare Technologies

BlackSquare Technologies

Volunteers
MJ

Margo Josephs

Host Company Liaison, Engage Colorado
avatar for Deacon Wardlow

Deacon Wardlow

Director of Special ops, Spectacular Media
I make complex stuff simple. Anything, anywhere, anytime.

Thursday November 19, 2015 11:30am - 12:30pm
Applied Trust 1033 Walnut Street, Boulder, CO 80302
  • Sort by Neighborhood Downtown
  • Company Description Over the past 5 years, we have designed and engineered-and now sell and distribute-our patented, real time hardware encryption and key management IT device we call Enigma. Enigma looks like a thumb drive, but does NOT store data. Now with one click, you can securely encrypt any file or folder you deem confidential. Enigma is WIN and MAC compatible, and works with any USB port on your PC or MAC. We currently offer a consumer and small business product, and will complete our enterprise product with funding. Once connected to a PC/NB/Tablet, Enigma allows complete management of any active network element, including ANY cloud storage application. As a low level hardware encryption layer, Enigma supports enterprise software security management solutions.
  • Tags encryption, hackers, security

Attendees (16)




Twitter Feed