0
1
+ 1
0

What is MC²?

It is a platform for running secure analytics and machine learning on encrypted data. Organizations can safely upload their confidential data to the cloud in encrypted form and securely compute analytics and machine learning without exposing the unencrypted data to the cloud provider. It also enables secure collaboration among multiple organizations, where the data owners can use the platform to jointly analyze their collective data without revealing their individual data to each other.
MC² is a tool in the Security category of a tech stack.
MC² is an open source tool with 168 GitHub stars and 18 GitHub forks. Here’s a link to MC²'s open source repository on GitHub

MC² Integrations

MC²'s Features

  • Platform for running secure analytics and machine learning on encrypted data
  • Organizations can safely upload their confidential data to the cloud in encrypted form
  • Securely compute analytics and machine learning without exposing the unencrypted data to the cloud provider

MC² Alternatives & Comparisons

What are some alternatives to MC²?
OpenSSL
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Ensighten
Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion.
Authy
We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
Sqreen
Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.
See all alternatives
Related Comparisons
No related comparisons found

MC²'s Followers
1 developers follow MC² to keep up with related blogs and decisions.