Earn more from your referral.
A simple app letting you share referral links and discover new generous reward programs.
Tracking device without Panic Button
This device will help protect Children, Children with special abilities (disabilities), Old people with Dementia by alerting the guardians and allowing them to hear the sounds and view the surroundings immediately. A Parent or Guardian will get an alert without ...
Biometric terminals for access control needs.
The most advanced GPS tracking device in India
Featuring the latest SIRF IV GPS chipset and an extended 150 hour battery life, accuGPS leverages the most advanced technology that allows you to stay in touch with your children, loved ones and assets even in the most remote locations anywhere in the world. Key ...
Online Fraud prevention and Account Takeover protection for your online business.
Sentropi is the solution to problem of reliable online identification! Using ground breaking Device Fingerprinting technology, combined with state of the art, highly durable tagging methods, Sentropi creates the next generation of online identification measures.
Secure Access to Applications hosted anywhere using any device from anywhere
InstaSafe Secure Access (ISA) helps businesses provides secure access to its critical business applications hosted in-premise, cloud, datacenter or any hybrid environment for its employees and branch offices alike without the need of investment into any hardware ...
Information Risk Management Solutions from Aujas offer top-class Global Information Risk Management Services & technology life-cycle services to enhance the information value in your enterprise through innovation and excellence
Web Site and application development Comapny
Aoxior is an enterprise technology solution provider. We work with our clients to build robust, award-winning web and mobile solutions for all paltforms.
Invite-only mailing list.
We search the best weekend and long-haul flight deals so you can book before everyone else.
IoT devices security built in
We create routers and IoT devices with Tor built into it. Users need not worry of their smart houses ever being compromised. With Tor in all the devices, all communications the devices make are all encrypted. The router acts as the central hub for all the compute ...
Security labels for protection from insider threats - tampering and counterfeiting
smartDNA is an automated tamper detection and anti-counterfeiting technology using purely passive smart labels and purpose-built scanning solutions. It helps in detecting insider threats like pilferage, counterfeiting, parallel imports, confidentiality breach in ...
Campus/Condo - Children/Visitor Tracking
We're developing a product for tracking, reporting and recording movement of people or assets in a campus or a buidling. This works where GPS and Cell phone access is limited too. This product uses multiple indoor wireless technologies. We deploy the network and ...
Gesture Control For IoT
Kratos is a wearable band that let's you interact with you electronic devices around you with just moving your hand in the air. Want to control TV, Lights, Fans, Computers, Game Consoles, Cars, Presentations etc. all with only one single swipe in the air. It ...
Mobile Security Solutions for Enterprises
Android Framework for Exploitation - An Open Source tool, helps users to find vulnerabilities in Android applications and platforms. Extendible and Customisable. Users could add their own vulnerabilities and use it in their enterprises or to check their app for ...