Best Encryption Software in Europe

Find and compare the best Encryption software in Europe in 2024

Use the comparison tool below to compare the top Encryption software in Europe on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    DropSecure Reviews

    DropSecure

    DropSecure

    $10 per month
    DropSecure ensures that your keys to unlocking your data are never shared to anyone you don't want to share them with, even us. This means that you can enjoy complete privacy with our military-grade encryption technology and file transfer technology. Find the best way to share documents. DropSecure's mission is to empower you with technology that protects digital assets in a simple and hassle-free way. DropSecure protects you privacy and protects your data using military grade algorithms before they leave your device. We offer the best technology to protect your data from data centers. You are always aware of who has access your sensitive documents, regardless of whether you are a business, individual, or an enterprise. Most importantly, you are the only one who has access to your documents. Not even us.
  • 2
    Cubbit for Teams Reviews

    Cubbit for Teams

    Cubbit

    €6 per user, per month
    Cubbit for Teams, a SaaS distributed cloud storage service, provides complete security for businesses. Cubbit is able to provide complete security because no one can access uploaded files except the service provider. Cubbit for Teams reinvents security by offering an easy-to use platform. Zero-knowledge and end to end encryption protects users as they save, sync and share their data. The web-app allows you to access information from any location at any time. Employee permissions can be managed with the click a button. Files can be shared without a limit on size and unsecured emails are replaced by Cubbit Private Links, a 100% secure sharing option that matches the encryption key to the folder. Cubbit can be more cost-effective than traditional data-centers by using a distributed architecture. This allows Cubbit to offer a much lower service price than its competitors. You will also save CO2 per file.
  • 3
    Box KeySafe Reviews

    Box KeySafe

    Box

    $130 per month
    KeySafe with AWS GovCloud allows government agencies and contractors to have independent control over their content encryption keys. This is especially useful for content that is citizen-only or ITAR. Your most valuable assets include unreleased screenplays, top secret designs, and patents for a new drug. These assets must be shared with your partners, contractors, and vendors to bring your ideas to the market. KeySafe allows you to keep your IP protected and not be exposed to third parties. Your clients trust you with their most sensitive information and can rest assured that their data is protected from unauthorised third party access. KeySafe helps you meet your legal and ethical obligations regarding the protection of client data. It allows you to set up appropriate controls to prevent or turn off access to documents and minimize reputation risks associated with someone else seeing your clients' data.
  • 4
    GhostVolt Reviews

    GhostVolt

    GhostVolt Ltd

    $20 per year
    GhostVolt is a privacy App which provides a secure, collaborative working environment for you and your team. GhostVolt stops unauthorised access to all your documents and helps fight against data theft and cybercriminals who want to steal your files and use them for ransomware, blackmail, and other criminal attacks. Control every user's permission with pre-set roles or customize what they can and can't do with every file. Also grant or restrict access to folders of your choice at any time. With powerful reporting tools you can also track and export the complete history of every user action or the history of any file. Take control of your data and get back to work, with GhostVolt.
  • 5
    Satori Reviews
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 6
    Concealer Reviews

    Concealer

    BeLight Software

    $19.99 one-time payment
    This Mac encryption software is reliable and secure. It stores data in the form of cards, and uses industry-standard data encryption methods (AES-256) to protect credit card numbers, website passwords and software license codes. It also protects confidential files and photos. This password manager includes card templates that make it easy to store credit card details, passwords, login information, serial numbers, and other information. Simply select a category and then copy your data into it. This encrypted data will not be accessible to anyone without your master password. Our encryption software hides your files and protects them with AES256 encryption. To double your protection, you can either use the master password only or create a separate password for each vault. Drag and drop files from the Finder to add them. It's simple and effective.
  • 7
    IceIT Reviews

    IceIT

    Quantum Knight, Inc

    $7.99
    IceIT is a desktop utility that's always free. It allows you to encrypt files quickly and easily with quantum-strength cryptography. IceIT also offers commercial upgrades that enable users to create private networks and always-on sharing, without the need of a cloud account. IceIT allows you to use email, text messages, and other legacy communication methods without worrying. You want to protect your backups? Just IceIT!
  • 8
    RMail Reviews

    RMail

    RPost

    $7/month/user
    RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files.
  • 9
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 10
    Polar Crypto Component Reviews

    Polar Crypto Component

    Polar Software

    $239.00/one-time/user
    Polar Crypto Component provides unbreakable encryption functionality to your Windows applications. It allows you to create your own security systems immediately or to integrate it into existing systems, increasing their security and performance. Polar Crypto uses the most recent encryption technology and includes full source code written using MS Visual C++. Polar Crypto is an ActiveX component and DLL component that can be used whenever secure information, authenticity, and data integrity are required. Absolute confidentiality is required in all business transaction applications. Digital signature creation and validation Applications used in e-commerce websites to store sensitive information, such as credit card details of clients. Desktop applications that encrypt confidential files on your PC or computer network.
  • 11
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.
  • 12
    Cryptomator Reviews
    Lock your cloud. Cryptomator gives you the keys to your data. Cryptomator quickly encrypts all your data. After encryption, you can upload your data protected to your cloud service. You can take control of the security and privacy of your data. Cryptomator is an easy tool for digital self defense. It allows you to secure your cloud data independently and by yourself. Most cloud providers either encrypt data only when it is transmitted or keep the keys for decryption. These keys can be stolen or copied and misused. Cryptomator gives you the keys to your data. Cryptomator makes it possible to access your files from any device. It is easy to use and seamlessly integrates with the cloud. Cryptomator's technology is up-to-date and encrypts files and filenames using AES and 256 bits key length. Cryptomator allows you to create a password for a folder (which we call a vault) within your cloud. That's it.
  • 13
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 14
    east-tec SafeBit Reviews

    east-tec SafeBit

    east-tec

    $29.95 one-time payment
    east-tec SafeBit is a disk encryption program that protects your data from unauthorized access and information leaks. It features on-the-fly disk encryption, by creating virtual disk drives, where you can [hide files & folders](/safebit/hide-folders/), keep them encrypted all the time, but still work with these files just like you work with normal files. east-tec SafeBit is a disk encryption program that protects your confidential information from unauthorized access and data breaches. It's a great addition to computer privacy software. It allows you to install and execute programs in encrypted vaults. This will ensure that all your traces are encrypted inside the safe. Use east-tec SafeBit to encrypt files and folders on-the-fly. On-the-fly encryption is when data is automatically encrypted before it is saved, and decrypted after it is loaded. This is done without user intervention.
  • 15
    ZevaCrypt Reviews

    ZevaCrypt

    ZevaCrypt

    $9.90 per month
    Increase the return on investment for existing PIV infrastructure to enable cross-agency encryption with ZevaCrypt™, an intuitive and true end–to-end encryption solution. Secure email communication has been a problem that has been difficult to solve, especially for those who struggle to enforce high assurance credentials like PIV or CAC. Email is still our primary method of communication for sensitive and non-sensitive information. Although encryption within an organization is easy, it can be difficult and sometimes manual to encrypt email across organizational boundaries. Existing PKI encryption systems do not provide the required level of protection. Additionally, currently no encryption system validates certificate policies in the way they were intended. Strong encryption must combine strong identity and strong cryptography. This intersection of goals can only be achieved using PKI encryption.
  • 16
    Cryptshare Reviews

    Cryptshare

    Cryptshare

    €5 per user per month
    Cryptshare is an innovation that protects your information when it is most at risk. Everybody needs to communicate data and messages in their daily work. We face many limitations once data is in transit. 1. Data protection 2. Limitations on file size These problems can be solved with our solution in an efficient and user-friendly manner. It also offers many other benefits, including: *Detailed audit trail *Compliance to central data protection regulations *Excellent potential to automate business communication It is also affordable, simple to implement, and accessible from any device with a web browser. Cryptshare is compliant with ISO 27001, GDPR. Cryptshare protects your information throughout the process.
  • 17
    WinZip SafeShare Reviews

    WinZip SafeShare

    WinZip

    $34.95 one-time payment
    Modernized sharing experience. You can share your files with confidence and security in an intuitive environment designed with simplicity in mind. This powerful sharing tool allows for you to share, compress, encrypt and decrypt files all within a simple interface. You can easily share files to one or more locations. Additional layers of security include military-grade encryption, time bomb capabilities, and extra layers of encryption. You can now enjoy expanded cloud services such as OpenStack and SwiftStack regions, credential files, Alibaba and Wasabi, HP and Oracle, Azure, WebDAV and CenturyLink, IONOS, and OVH cloud providers. To save, zip, and share multiple PDF files, combine them into one PDF file. Slack IM streamlines workflow for sharing files. WinZip and ZipShare files can be managed. View, open, share again, or delete shared files. Keep track of the Zip files that you have shared via ZipShare or WinZip. You can email anyone directly using WinZip by adding contacts to all supported sources into one address book.
  • 18
    JM-Crypt Reviews

    JM-Crypt

    JM-Crypt

    $2.99 (Android) - $9.99 (PC)
    Multi-platform, low-cost and professional software (Windows PC - Android Mobile) that encrypts sensitive data like photos and documents to protect them against theft or ransom. Ideal for VIPs and liberal professions like lawyers, doctors, etc. Check out our detailed product sheets on MS Store – "JM-Crypt PC" and Play Store – "JM-Crypt Mobile". Our software install on your device locally. No remote servers, no third parties, no pub, no IT backdoor and this for a derisory cost and unlimited duration. JM-Crypt uses the best known certified and official algorythm : AES-256 – CBC – PKCS with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. The PC version allows serial encrytion, much better than full disk encryption as this method doesn't slow down your computer's performance, "JM-Crypt PC" can handle for fast encryption any folder or file extention of your choice.
  • 19
    Salesforce Shield Reviews

    Salesforce Shield

    Salesforce

    $25 per month
    With platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements.
  • 20
    PureEncrypt Reviews

    PureEncrypt

    PureVPN

    $3.99 per month
    Anyone who doesn't know the password will have no idea what your files are. Store your files on a secure cloud or lock them up on your computer. Cloud storage with encryption is available to protect documents, photos, videos, and more. Encrypt all your files, videos, photos and more. If you want to share encrypted files or folders, you can export them in complete privacy. PureEncrypt allows you to encrypt files and then save them in your cloud storage. Store files securely and conveniently in a location you can easily access. Passports, private documents and more can be locked behind password-protected vaults. Create and protect unlimited secure vaults to keep your files safe. You can sync your vaults with password protection from anywhere. You can be confident that your privacy is protected while you log in to up to 10 computers.
  • 21
    Vaporstream Reviews

    Vaporstream

    Vaporstream

    Free
    Vaporstream allows you to have leak-proof conversations, send disappearing message, and remain compliant while still maintaining control over your information. You should always be able to control who can view your sensitive business data, when it is shared, copied, forwarded or saved across your enterprise and even after the information reaches the recipients' devices. You can enjoy the convenience of mobile apps, but with the functionality, reliability and privacy that your business requires. Our advanced content control and enterprise-level protection allows for private and disappearing business communication while maintaining compliance with organizational requirements and regulatory requirements. Send disappearing messages and maintain compliance. You can store and integrate your records with your workflows. Securely communicate with external users. Mobile application with desktop client. Shred conversations and not just messages.
  • 22
    Evervault Reviews

    Evervault

    Evervault

    $395 per month
    Evervault can help you go from zero to audit ready in less than one day. Evervault is compatible with all cardholder data flows so you can collect PCI data in a compliant manner for processing, issuance or storage. In most cases, our PCI scope will be reduced to the SAQ A set of controls -- the smallest PCI DSS control set. We will work with you to fully understand your architecture, and make recommendations on how to integrate Evervault in order to reduce your compliance scope to the maximum. We'll help you integrate Evervault using one of our templates, and then we'll verify your integration to make sure it's fully-compliant. We will provide you with a PCI DSS policy and procedure bundle that is audit-ready, as well our PCI DSS Attestation Of Compliance (AoC). We'll introduce you to an Evervault-trained auditor.
  • 23
    MOVEit Reviews
    The MOVEit Managed file Transfer (MFT), software is used by thousands worldwide to provide complete visibility and control of file transfer activities. MOVEit ensures the reliability of your core business processes as well as the safe and compliant transfer sensitive data between customers, partners, users, and systems. MOVEit's flexible architecture lets you choose the capabilities that best suit your organization's needs. MOVEit Transfer allows you to consolidate all file transfer activities into one system, allowing for better control over core business processes. It provides security, centralized access controls and file encryption, as well as activity tracking, to ensure operational reliability and compliance to regulatory requirements, SLA, internal governance, and regulatory requirements. MOVEit Automation can be used with MOVEit Transfer and FTP systems to provide advanced workflow automation capabilities, without the need of scripting.
  • 24
    east-tec InvisibleSecrets Reviews

    east-tec InvisibleSecrets

    East-Tec

    $39.95 one-time payment
    east-tec InvisibleSecrets, a revolutionary file encryption and steganography software, allows you to encrypt files and folder structures containing confidential data. It also gives you the ability to hide files making them invisible to anyone. Use east-tec InvisibleSecrets to encrypt and hide file contents. It is a complete privacy and encryption software solution. We will also discuss other useful features such as password manager, file shredder, and program lock. east-tec InvisibleSecrets, a file encryption program, helps you protect your confidential data from prying eyes and unwanted access. It encrypts file or folder structures on your computer. It features strong file encryption algorithms that provide privacy protection. Protect files and sensitive information by hiding them.
  • 25
    ESET Endpoint Encryption Reviews
    This standalone encryption solution is easy to use and allows remote control of encryption keys and security policies for files on hard drives, mobile devices, and emails. Patented technology to protect data from all sizes of businesses. ESET Endpoint encryption is FIPS 140-2 certified with 256-bit AES encryption. ESET Endpoint encryption does not require a server to deploy and can seamlessly support remote users. From one dashboard, manage encryption on Windows and native macOS encryption (FileVault). ESET Endpoint encryption gives companies greater control over the protection of specific files, folders and virtual disks. Encrypting email attachments and restricting access for certain users to removable media can help protect data in transit and prevent leakage from outside. A dedicated ESET Endpoint Encryption console gives you full control over licensing, software features, security policy, and encryption keys.