Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Boxcryptor safeguards your organization's cloud data across various platforms, including OneDrive, SharePoint, Dropbox, Google Drive, and others. By encrypting files directly on your device, Boxcryptor ensures that data remains secure and protected before it gets uploaded to your preferred cloud storage. Compatible with Windows, macOS, iOS, and Android, Boxcryptor enables seamless cross-platform functionality. It enhances security for over 30 different cloud providers and extends its protective measures to NAS devices, file servers, and local data as well. While the cloud offers accessibility and backup options, Boxcryptor guarantees the confidentiality of your sensitive information. The software has undergone rigorous audits by Kudelski Security, confirming its quality and security standards. Users can enhance their security further by enabling two-factor authentication (2FA) for sign-ins on an additional device. Additionally, Boxcryptor simplifies user management through support for SSO, SCIM, and Active Directory. With group features, Microsoft Teams encryption, and Whisply, Boxcryptor allows for secure collaboration not just within your team, but also with external partners, ensuring that all communications and data exchanges are protected. This makes Boxcryptor an essential tool for organizations that prioritize data security in a collaborative environment.
Description
The Polar Crypto Component provides robust encryption capabilities for Windows applications, allowing developers to create their own security systems quickly or seamlessly integrate it into pre-existing setups to bolster security and efficiency. With cutting-edge encryption technology and the complete source code available in MS Visual C++, it serves as an ActiveX and DLL component that can be utilized in scenarios requiring secure information handling, authenticity, and data integrity. This component is essential for applications engaged in business transactions that demand the highest level of confidentiality, as well as for generating and validating digital signatures. Additionally, it proves invaluable for e-commerce websites that manage sensitive client data, such as credit card information, and for desktop applications designed to encrypt private files on individual computers or across networks. Furthermore, Polar Crypto not only enhances security but also ensures compliance with industry standards for data protection.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon S3
Box
DRACOON
Dropbox
Egnyte
Google Drive
LiveDrive
Mail.ru
Microsoft OneDrive
Integrations
Active Directory
Amazon S3
Box
DRACOON
Dropbox
Egnyte
Google Drive
LiveDrive
Mail.ru
Microsoft OneDrive
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$239.00/one-time/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Boxcryptor
Country
Germany
Website
www.boxcryptor.com/en/
Vendor Details
Company Name
Polar Software
Country
Croatia
Website
www.polarsoftware.com
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking