Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2025-09-11
As discussed earlier, using Crypt4GH with remote keys is a vital ingredient to make the whole ecosystem work and protect sensitive genomic data at rest. A similar issue arises when there is a system - such as a repository platform - that needs to process uploaded Crypt4GH containers. With the latest Crypt4GH 0.12 release the solution has arrived.
Written by Dominik Pantůček on 2025-08-28
Working on YubiKey support through GnuPG to enable working with Crypt4GH containers protected by private key stored in a trusted device, it seemed like a natural extension to keep the key locally and use it remotely - for example on a high-performance computing server.
Written by Lucie Zdeňková on 2025-08-14
Do you know someone who is colorblind - or are you yourself? Color blindness is relatively common vision deficiency, so let's have a look, how we deal with this challenge in the software we are developing.