Getting started
Start by selecting a product to browse its documentation.
Shield
Obfuscation and code encryption to prevent reverse engineering.
Secrets
Securely store and manage sensitive information in your applications.
Logs
Advanced features such as file rotation, data masking, duplicate log suppression, user identification, and metadata enrichment to ensure robust logging and analysis capabilities.
Storage
Secure data storage and retrieval, offering features like encryption, compression, and embedded resource management.
All the products of the platform are easily integrated, can be managed from the cloud panel and are synchronized with each other. In this way you can centralize all the security of your applications in one place.