Mandelbrot Portion



The use of encryption is becoming increasingly common as a means to keep information secure. We use standard symmetric and asymmetric algorithms in our cryptographic library software.

Key Management

Using widely available, well-known and standardised algorithms it is relatively easy to implement cryptographic functions in software. An often overlooked part of developing cryptographic systems is that of managing cryptographic keys, both on local devices and in centralised key management systems.

Often used in conjunction with or part of key management systems, authentication protocols enable cryptographic verification of users and end-devices.

Secure Software

A crucial aspect of developing cryptographic systems is the process of secure design and implementation of software.

Data Protection


The General Data Protection Regulation is now only a few months away. The DP Hub provides a substantial body of information on data protection to help businesses and organisations comply.


Complete our GDPR Survey and find out whether your business complies with the new legislation.