How Cryptosense Works
A compliant cryptography provider is the first step towards a secure solution. Try our compliance tester for PKCS#11 APIs.
Vulnerabilities arise when commands that are individually secure, are used in combination. Cryptosense configuration software finds these combinations.
Once the configuration is secure, the application has to make use of the interface in a secure way. Cryptosense App Tracer analyses the calls made to the crypto interface.
Cryptosense Monitor continually checks configurations and key usage, sending alerts if out-of-standard configurations are found and providing reports for audits.