What is Tang

A data security and governance platform that provides automated discovery, classification, and protection of sensitive data across cloud, on-premises, and hybrid environments.

Tang: A Server for Data Binding to Network Presence

Tang is a server that facilitates the binding of data to network presence.

Data Availability Based on Network Connection

Data is only accessible when the system that holds the data is connected to a specific network.

The Client Retrieves a List of Tang Server's Asymmetric Keys

The client retrieves a list of the Tang server's advertised asymmetric keys. It then selects one of these keys to generate a unique encryption key, which is used to encrypt the data. After the encryption process, the client discards the encryption key. When the client is ready to access the encrypted data, it performs an HTTP POST request to recover the encryption key. Tang provides a straightforward and secure alternative to key escrow.
 

Tang Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Tang tool and help others make informed decisions.

Zama
Free

Zama View Zama

Zama is pioneering the future of privacy with homomorphic encryption, making privacy a non-issue by design. Our community is dedicated to solving complex privacy and security challenges across cloud applications and public blockchain smart contracts. By enabling end-to-end encryption wherever applications run, Zama aims to make secure, private online interactions a mainstream reality.

Pioneering Homomorphic Encryption Technology
End-to-End Data Encryption Solutions
Enhanced Cloud Application Security
Tenzir
Free

Tenzir View Tenzir

Tenzir empowers cybersecurity teams with next-generation network forensics, leveraging big data analytics to systematically investigate cyber attacks. Our platform provides intelligent decision support and automated forensic capabilities, enabling proactive defense against today's complex threat landscape and significantly improving an organization's security posture and ROI.

Advanced Network Forensics
Big Data Analytics for Security
Real-time Threat Investigation
Kriptos
Free

Kriptos View Kriptos

Kriptos is an AI-powered platform designed to elevate your organization's cybersecurity, risk, and compliance posture. By automatically classifying and labeling sensitive documents based on content and context, Kriptos provides unparalleled visibility into your critical information assets. Gain actionable insights into data usage, identify potential risks, and streamline compliance with regulatory requirements by understanding where your most sensitive information resides and who has access to it.

AI-driven automatic document classification and labeling
Multi-level sensitivity assessment (Confidential, Restricted, Internal Use, Public)
Advanced analytics for information usage and anomaly detection
Kiteworks
Free

Kiteworks View Kiteworks

Kiteworks offers a Private Content Network (PCN) that provides zero-trust security and compliance for an organization's sensitive digital communications. It empowers businesses to manage risks associated with sending, sharing, receiving, and storing critical data, ensuring robust content governance and regulatory adherence. The platform unifies, tracks, controls, and secures all sensitive content flows, significantly enhancing risk management and bolstering compliance.

Private Content Network (PCN)
Zero-Trust Security Architecture
End-to-End Content Protection
Cyera
Free

Cyera View Cyera

Cyera is the leading Data Security Posture Management (DSPM) platform, empowering organizations to gain complete context and control over their sensitive data. By providing instant visibility into all data assets, nuanced risk assessment, and automated remediation, Cyera significantly reduces attack surfaces and strengthens operational resilience. We are fundamentally transforming how businesses approach data security, offering a holistic solution for comprehensive data protection.

Comprehensive Data Discovery and Classification
Real-time Data Risk and Exposure Assessment
Automated Remediation and Security Posture Improvement