Affordably Source Encryption Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Encryption Inquiries

Area Icon

Encryption Virus

I don't know if you can help with this issue. I was subject to a ransom encryption virus. It impacted the back up drive as well. The ransom was paid and the link was taken down. Do you offer services to help decrypt without a key or back up?

  1. Profile Picture

    Johnathan |Information Security Analyst II

    *****'re probably out of luck. There's a slight chance if the malware left behind a key....

    1.5 Hours Later
  2. Profile Picture

    Clarence |Consultant

    Check historical backups they may be ok....

    1.8 Hours Later
  3. Profile Picture

    Eric |Managing Partner

    agree - how many ***** does the backup tree goes...hope it's more than 1...start with th...

    5.2 Hours Later
+4 Other Responses
Area Icon

Patent Filing

Seeking information on a patent search in the area in encryption.

  1. Profile Picture

    David |President

    I am a *****arch and analysis and can do your prior art and *****ch. I have many ...

    1.1 Hours Later
  2. Profile Picture

    Shriniket |Senior Research Assistant

    I am from India having knowledge and experience in ***** company in the field of *****...

    1.3 Hours Later
  3. Profile Picture

    Kazim |Partner & Patent Agent

    Dear Colleague, I should likely be able to assist you with any intellectual property matter. If yo...

    1.7 Hours Later
+10 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Google App Engine

We are looking for consultants who could advise us on the following: 1. What the best method to interface ios and android apps with a google app engine backend using java. 2. Should we use google cloud endpoints or restful apis, etc. 3. Provide us with sample code that allows our client-side app (ios or android) to store and retrieve data from the google cloud. 4. Advise which combination to use for storing data and media (pictures, videos, and audio) such as datastore and blobstore or datastore and google cloud storage (gcs). 5. User authorization and data encryption should also be covered when we talk about the data communication between the client and server sides our goal is to have a high level consultation to make sure we are using the right technologies for scalability and security and speed.

  1. Profile Picture

    Oliver |Director of Product Development

    We have extensive experience mobile/tablet *****lopment. If you have bullet points to di...

    1 Minute Later
  2. Profile Picture

    Arivalagan |Programmer

    i'm Arivalagan having around 3 years of experience in Android Development.Here we are Using RESTful ...

    1 Minute Later
  3. Profile Picture

    Jake |Presales

    Hi ,We have expertise resource available who can carry the task easily and we have done similar kind...

    1 Minute Later
+6 Other Responses
Area Icon

Encryption

I need information on devices or encryption methods on cia or satellite mind hacking reading. I have seen quwave on simple google search. I need to know if these work or other methods to complaint to correct authorities.

  1. Profile Picture

    Charles |Chief Executive Officer

    Hello, Thank you for your inquiry and request. Please have a look at my background and profile. I...

    11.8 Days Later
  2. Profile Picture

    Mehrdad |Founder/Principal Senior Consultant

    Hello, As your technology consultant provider, we believe our success depends on the ability to prov...

    16.4 Days Later
+2 Other Responses
Area Icon

Record Procurement

Record procurement-litigation support services 1. Supply market landscape - overview of supply market in the u.S. – types of suppliers, most dominant supplier segment - list of key suppliers in the u.S. Compliance to info protect: 1. Appropriate access controls within the solution 2. Encryption of data at rest etc.

  1. Profile Picture

    Thomas |Lecturer & Professor in

    I could only help with encryption of ***** rest, but the remainder I am unfamiliar with....

    3.3 Hours Later
  2. Profile Picture

    Shyam |CFO Advisor

    Very knowledgeable about Access controls in US and can assist...

    10.8 Hours Later
+2 Other Responses
Area Icon

Mobile Cryptography Sha1

Someone hacked our keystone.We need to get sha256 encryption from our signed build searching for mobile cryptography sha1,sha256,aes256, hmac

    +undefined Other Responses
    Area Icon

    Endpoint

    Looking for mcafee consultants for an ongoing project in california. Must have knowledge and experience the following: epo endpoint encryption, intrushield and hips

    1. Profile Picture

      And |Technical presale, Security solution man

      Hello! Is it possible to do remotely?...

      5 Days Later
    2. Profile Picture

      Praveen |Security Researcher

      I can complete you project, has been working on *****rity domain from past 6 years with g...

      110.9 Days Later
    +2 Other Responses
    Area Icon

    Email Encryption Market

    We are a us based investment firm that is looking to better understand the email encryption software market for enterprises. Key vendors include zix corp and proofpoint. We are looking to understand: 1) what are the key attributes that differentiate email encryption solutions from various vendors, including zix and proofpoint? 2) are there changes in encryption technology or new entrants who could threaten the incumbent position of vendors like zix? 3) can you discuss the default encryption provided with google (gmail) and office 365 (outlook)? Why would an enterprise in a high-security-requirements industry (government, healthcare, finance, etc.) find these defaults unsatisfactory and choose to pay for third-party email encryption through a vendor like zix? Good candidates would include: · customers of an email encryption solution at a large enterprise · former employees of zix and/or proofpoint · current or former employees of competitors to zix and/or proofpoint

    1. Profile Picture

      James |Security Evangelist

      Zix is a well establish incumbent with ***** users of Google or Microsoft cloud email/apps w...

      3.3 Hours Later
    2. Profile Picture

      Ken |Security / System Specialist

      All, This sounds like a very interesting position. I have ProofPoint expernece from the compliance s...

      4.1 Hours Later
    3. Profile Picture

      George Cristian |Partner, Executive Manager

      On short: Zix solution is best it you use G-Suite (*****) and Proofpoint if you company uses Offic...

      12.3 Hours Later
    +25 Other Responses
    Area Icon

    Nondeterministic Algorithm

    I need a very fast (running in microseconds on a conventional processor) non-deterministic algorithm that can be used by a symetric cipher such as aes.

    1. Profile Picture

      Yves |R&D Manager

      The Intel processors now have a ***** of vector instructions to ***** encryption/de...

      31 Minutes Later
    2. Profile Picture

      Neil |Principal

      Seems like a *****e inquiry. There are many ways to optimize cipher algorithms and hardware as...

      1.5 Days Later
    3. Profile Picture

      Susan |Head of Sales and Marketing

      Hi , We have AES IP core ,Let me know we can provide the same . Contact us : *****...

      49.2 Days Later
    +7 Other Responses
    Area Icon

    Web Application Development

    Web application developer for a full time position in atlanta georgia with a two year young start-up. Responsible for creating of web applications that take into consideration all aspects of application development architecture design including - performance, scalability, coding, caching, security, encryption, session state management, and error logging and testing. The important skills for this position are c, asp.Net, mvc, silverlight, and sql. 4+ years development experience 3+ years in c, asp.Net, mvc, wcf, .Net framework linq, entity framework sql server 2010/2012, windows server 2010/2012 silverlight, ssrs experience desired cloud application development experience desired windows azure experience desired html 5/jquery/ajax/spa (single page application) experience desired proven track record of designing scalable, distributed software applications object-oriented design experience and as important...People skills!

    1. Profile Picture

      Raj |Software Engineer

      Hello Team, I would like to apply for the same, please let me know what are the step to do so. Th...

      1.9 Days Later
    2. Profile Picture

      Alkesh |President

      Hello, My name is Alkesh Patel, President of the Tap Consulting Inc. We are providing services to Ca...

      3 Days Later
    3. Profile Picture

      Muhammad |Analyst Programmer

      Hi. I am involved in ASP.Net MVC development form last four year. Major responsibilities of my jobs ...

      4.7 Days Later
    +4 Other Responses
    Area Icon

    Hipaa Compliance

    We are planning to use a private 128 bit key encryption software to secure our data on the network. How do we know if our method is hipaa compliant?

    1. Profile Picture

      David |Health Care Lawyer

      Encryption is just one piece of the puzzle - I'd be happy to discuss with you and see if we could wo...

      3.8 Hours Later
    2. Profile Picture

      Marty |President

      Good morning, My apologies. We offer compliance consulting for products going to market, however no...

      3.8 Hours Later
    3. Profile Picture

      Jeffrey |Experienced Healthcare Attorney and Inno

      Hi, In addition to having a great deal of experience in healthcare law as the general counsel of a ...

      5.2 Hours Later
    +8 Other Responses
    See More Inquiries

    Top Encryption Experts

    See More Experts
    Share
    LinkedInTwitterFacebookGoogle+