What is MC²?
It is a platform for running secure analytics and machine learning on encrypted data. Organizations can safely upload their confidential data to the cloud in encrypted form and securely compute analytics and machine learning without exposing the unencrypted data to the cloud provider. It also enables secure collaboration among multiple organizations, where the data owners can use the platform to jointly analyze their collective data without revealing their individual data to each other.
MC² is a tool in the Security category of a tech stack.
MC² is an open source tool with 168 GitHub stars and 18 GitHub forks. Here’s a link to MC²'s open source repository on GitHub
- Platform for running secure analytics and machine learning on encrypted data
- Organizations can safely upload their confidential data to the cloud in encrypted form
- Securely compute analytics and machine learning without exposing the unencrypted data to the cloud provider
MC² Alternatives & Comparisons
What are some alternatives to MC²?
See all alternatives
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion.
We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.
No related comparisons found