This is a plugin to upload directly attached files from your Outlook Web Access or Outlook desktop version. Quite convenient for your daily mail. You do not need API key to use this.
Standalone windows program to drag and drop any file and easily upload it to DIARIO. Download it here.
Standalone .deb package to drag and drop any file and upload it to DIARIO. Download it here.
Standalone Mac OS program to drag and drop any file and easily upload it to DIARIO. Download it here.
Anonymous client means that content of the files are never uploaded to our servers. But anyhow, even if updated, we do not keep them. If you are even more paranoid, you can build your own anonymous client.
If you do not trust us and do not want to upload the whole document, use our special client, that will NOT upload the whole document.
Somes documents could be encrypted and we need it for the analysis, please introduce the password if you know it See more.
We do not use or store any document content, just its structure and formal characteristics. We extract the features that are not assignable to a single document in order to create an effective, predictive and intelligent analysis.
We use our core malware detection learning based system from ElevenPaths (patent pending). A great solution for cloud computing environments.
Use our API. It is free and mostly instant. Save time with our machine learning prediction structures.
We do not even need the content. If you wish, just send us some of the features from it. Content is never needed for our predictions.
DIARIO bridges a natural gap that antiviruses do not usually match. DIARIO is not intended to replace antiviruses, but to cover the gap with fresh samples: DIARIO is especially good detecting them. DIARIO helps detect fresh malware without compromising your privacy or sharing content.
Our techniques are patent pending, and have been proven to be effective in some scientific congresses.Malicious PDF Documents Detection using Machine Learning Techniques. A Practical Approach with Cloud Computing Applications
Now we specialize in PDF and Office files.
We use machine based learning techniques, but they are trained with special sets of malware to reduce the gap between the “traditional solutions” and real malware issues.
Our analyses are ultra-fast. We do not even need the content of the document itself.
We want to keep privacy, privacy is respect.
We know… “intimacy” is not “privacy”… but we wanted an acronym.
You own your own data. You do not need to share it with someone else to check for malware.
Simple, shareable, team-focused and expandable threat hunting environment. Every tool and APIkey for first steps in threat hunting progress joined in a single and simple interface
SmartPattern is a new concept of authentication that enables login into any web service supporting standards protocols and the signature of documents, with a smart, simple and usual movement done over any smartphone. Even if an attacker knows the pattern, SmartPattern will only recognize the way you do it.
IDoT provides IoT devices with a unique identity, particularly those that perform critical operations and must be monitored in detail. This robust identity allows guaranteeing the sending of that information generated by the device in a secure way, using end-to-end encryption with an own certificate issued on the fly by Telefónica.