Best Panda Full Encryption Alternatives in 2025
Find the top alternatives to Panda Full Encryption currently available. Compare ratings, reviews, pricing, and features of Panda Full Encryption alternatives in 2025. Slashdot lists the best Panda Full Encryption alternatives on the market that offer competing products that are similar to Panda Full Encryption. Sort through Panda Full Encryption alternatives below to make the best choice for your needs
-
1
DriveStrike
DriveStrike
23 RatingsDriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected. -
2
Satori
Satori
86 RatingsSatori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements. -
3
SharePass
Free 11 RatingsSecrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed. -
4
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
5
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
6
Endpoint Protector
CoSoSys
1 RatingEndpoint Protector, a comprehensive, all-in-one Data Loss Prevention Solution for Windows, macOS, and Linux, prevents data theft and data leakage and provides seamless control over portable storage devices. Endpoint Protector can filter data in motion and at rest using regular expressions, dictionaries or data protection regulations like GDPR, PCI DSS and HIPAA. Endpoint Protector has several modules that can be combined and matched to meet client needs. These modules include Content Aware Protection and Device Control. Enforced Encryption is also available. eDiscovery is available. It makes work easier, safer, and more enjoyable, with a great ROI. -
7
Trellix Data Encryption
Trellix
Trellix Data Encryption secures removable media and devices to ensure that only authorized individuals can access the data they contain. Deploy encryption policy through a single console, monitor encryption status and generate compliance reports. Choose from a wide range of policy options for securing information across devices, removable media, and files. All policies can be managed from one location. Trellix Native Encryption centralizes BitLocker management and simplifies FileVault management into a single console, available on-premises as well as via SaaS. This centralization of administrative tasks, such as encryption key and pin management, saves time and money for organizations that manage multiple operating systems. - 8
-
9
WinZip SafeMedia
WinZip
Employees must be able to carry digital data wherever they go. Businesses must always ensure that this data is secure. WinZip SafeMedia allows users to store, manage and transport files safely on removable media, such as removable storage devices like CDs, DVDs and USB sticks. This empowers IT admins to enforce protocols and standards to defend your business from online and offline threats. Customize security policies according to the needs of your organization. You can customize settings for specific individuals or groups and monitor activity if needed. Drag and drop combined with automatic security features will provide users with an easy, simple solution that won't hinder their productivity. Use encryption and compression that is FIPS 140-2 certified and compliant. Best-in class encryption methods protect classified information, while enabling storage flexibility. -
10
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
11
BitLocker Drive Encryption integrates with the operating systems and addresses data theft or exposure from computers that have been lost, stolen or improperly decommissioned. BitLocker offers the best protection when used in conjunction with a Trusted Platform Modul (TPM) version 1.2.2 or later. The TPM is a hardware component that is installed in many computers made by computer manufacturers. It works in conjunction with BitLocker to protect user data and ensure that the computer is not tampered with when it was offline. BitLocker can be used to encrypt the Windows operating-system drive on computers without a TPM version 1.2. To start the computer or resume hibernation, the user will need to insert a USB Startup Key. To protect the operating system volume on a computer that is not connected to a TPM, you can use an operating-system volume password starting with Windows 8.
-
12
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
13
Salesforce Shield
Salesforce
$25 per monthWith platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements. -
14
Enveil
Enveil
We change the way organizations use data to unlock value. Data is the backbone for the digital economy. Enveil's award winning ZeroReveal®, solutions allow enterprises to securely and privately access data across organizational boundaries, jurisdictions and third parties. The interaction and results are never revealed. Our homomorphic encryption-powered capabilities and PETs provide a decentralized and efficient data collaboration framework that addresses business challenges such as data sharing, monetization and regulatory compliance. We offer the most advanced encrypted search, analytic and machine learning products in the market to protect data while it is being used or processed. This is the 'holy-grail' of secure data use. Enveil is a pioneering privacy-enhancing technology company that protects data for secure data sharing, usage, and monetization. -
15
Anchor
Anchor
Anchor's file-security platform is built using zero-trust principles to secure, control and manage your sensitive files while remaining invisible to end users. Traditional cybersecurity focuses primarily on locking down devices, networks, and people. All of this is done under the pretext of data security. Once files are shared, moved, or stolen, they are no longer protected. These controls frustrate users and get in their way. Cyber Insurance rates are increasing, as are the requirements to obtain coverage. The coverage is also decreasing. Most insurance companies require MFA in order to be covered and exclude ransom payments for stolen data. You can satisfy MFA and also eliminate the possibility that your data could be stolen and used against yourself. -
16
Dataguise
Dataguise
Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data. -
17
SecureZIP
PKWARE
Large-scale data breaches continue exposing the weaknesses in traditional information security strategies. It is clear that network and device protection are not sufficient. Volume encryption, also known as full-disk encryption, is a single-use case approach that leaves data exposed at the data level. In highly regulated industries, persistent data-level encryption is a necessity. PKWARE's industry-leading technology compresses files, reducing file size by up to 95% Authorized users can share and decrypt encrypted files on any enterprise operating system. You can protect sensitive data using a variety encryption methods, including certificate-based encryption and password-based encryption. This allows for organization-wide control and consistent policy enforcement. -
18
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™, Endpoint Encryption protects data on a variety of devices such as computers and laptops, desktops, USB drives and other removable media. This solution is available as a separate agent and combines enterprise-wide full disc, file/folder and removable media encryption to prevent unauthorized access or use of private information. You can manage all your users from one, integrated console. This console also allows you to use the same console for Trend Micro security products and endpoint protection. Endpoint encryption agents can be deployed to ensure your data is protected no matter what your mobile computing devices or organizational needs may change. -
19
Roseman Labs
Roseman Labs
Roseman Labs allows you to encrypt and link multiple data sets, while protecting the privacy and commercial sensitivity. This allows you combine data sets from multiple parties, analyze them and get the insights that you need to optimize processes. Unlock the potential of your data. Roseman Labs puts the power of encryption at your fingertips with Python's simplicity. Encrypting sensitive information allows you to analyze the data while protecting privacy, commercial sensitivity and adhering GDPR regulations. With enhanced GDPR compliance, you can generate insights from sensitive commercial or personal information. Secure data privacy using the latest encryption. Roseman Labs lets you link data sets from different parties. By analyzing the combined information, you can discover which records are present in multiple data sets. This allows for new patterns to emerge. -
20
Symantec Endpoint Encryption
Broadcom
Your staff depends on mobility and access from anywhere to be productive. Your sensitive data could be accidentally synchronized from cloud and put at risk if devices are lost or stolen. Symantec Endpoint Encryption safeguards sensitive information and ensures regulatory compliance. It encrypts every file on the hard drive, sector by sector, to ensure maximum security. It supports Windows, Mac, tablets and self-encrypting drives. It also supports removable media (USB drives and external hard drives) and Windows. Symantec Endpoint Encryption can also manage BitLocker-protected devices. Symantec Gateway Email Encryption ensures secure communications between customers and partners via centrally managed, secure channels. It reduces the risk of data breaches and ensures regulatory compliance. Symantec Desktop Email Encryption encrypts and decrypts emails between internal clients for desktop applications. -
21
SafeConsole
DataLocker
$28 per device per yearCentral Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time. -
22
This standalone encryption solution is easy to use and allows remote control of encryption keys and security policies for files on hard drives, mobile devices, and emails. Patented technology to protect data from all sizes of businesses. ESET Endpoint encryption is FIPS 140-2 certified with 256-bit AES encryption. ESET Endpoint encryption does not require a server to deploy and can seamlessly support remote users. From one dashboard, manage encryption on Windows and native macOS encryption (FileVault). ESET Endpoint encryption gives companies greater control over the protection of specific files, folders and virtual disks. Encrypting email attachments and restricting access for certain users to removable media can help protect data in transit and prevent leakage from outside. A dedicated ESET Endpoint Encryption console gives you full control over licensing, software features, security policy, and encryption keys.
-
23
OpenText ZENworks full disk encryption allows you to centrally enforce policies that encrypt entire hard drives on Windows 7, Windows 8 and Windows 10 machines within your organization. You can manage them with the same web-based interface and adaptive agent you use for other ZENworks Products. Encrypting your entire hard drive is a proven way to protect company data. Ensure that devices encrypted across the enterprise are easy to manage. You can remotely unlock devices protected by full disk-encryption and keep users productive when they work remotely. You must comply with government regulations and industry guidelines to protect patient and customer data. Use your experience with ZENworks in order to reduce the costs of implementing Full Disk Encryption.
-
24
EncryptRIGHT
Prime Factors
$0EncryptRIGHT simplifies the application-level data protection by separating data protection policies and application programming. This allows for a complete separation between information security, application programming, and data security. EncryptRIGHT uses a Data Security Governance approach to define and enforce how data is protected. It also determines who can access the data and what format it will take once access is granted. The unique Data-Centric Security Architecture allows information security professionals to create an EncryptRIGHT Data Protect Policy (DPP) and bind it to data, protecting it no matter where it is stored, used, moved, or stored. Programmers don't need to be experts in cryptography to protect data at the application level. They simply configure authorized applications to call EncryptRIGHT to request that data be appropriately secured or unencrypted according to its policy. -
25
Veeam Data Platform
Veeam
5 RatingsHow we keep businesses worldwide up and running: From secure backups to intelligent data insights, Veeam Data Platform is built to handle the complexities of modern data management. Your data, protected, recoverable, and free — just the way it should be. Veeam Data Platform is a simple yet powerful data management platform that goes beyond backup, providing businesses with reliable data protection, orchestrated recovery, and streamlined data management. -
26
WinZip SafeShare
WinZip
$34.95 one-time paymentModernized sharing experience. You can share your files with confidence and security in an intuitive environment designed with simplicity in mind. This powerful sharing tool allows for you to share, compress, encrypt and decrypt files all within a simple interface. You can easily share files to one or more locations. Additional layers of security include military-grade encryption, time bomb capabilities, and extra layers of encryption. You can now enjoy expanded cloud services such as OpenStack and SwiftStack regions, credential files, Alibaba and Wasabi, HP and Oracle, Azure, WebDAV and CenturyLink, IONOS, and OVH cloud providers. To save, zip, and share multiple PDF files, combine them into one PDF file. Slack IM streamlines workflow for sharing files. WinZip and ZipShare files can be managed. View, open, share again, or delete shared files. Keep track of the Zip files that you have shared via ZipShare or WinZip. You can email anyone directly using WinZip by adding contacts to all supported sources into one address book. -
27
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
28
Privacera
Privacera
Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system. -
29
WinMagic SecureDoc
WinMagic
SecureDoc is a solution for encryption and security management that protects data at rest. The software consists of two components: client software to encrypt and decrypt data, and server software to configure and manage the organization's laptops and desktops. SecureDoc uses a FIPS140-2 validated AES256-bit cryptographic algorithm to ensure compliance with industry regulations. The software protects sensitive data on multiple platforms (Windows, macOS, and Linux) with features such as pre-boot authentication, central management, and encryption. -
30
Ubiq
Ubiq Security
$0.001 per encryptEncrypt your sensitive data before leaving the application so that the storage layer and adversaries only see ciphertext. Client-side encryption that is native to the application protects data against sophisticated attackers, supply chain attacks, and internal threats. Most at-rest encryption solutions - transparent disk encryption, full disk encryption, etc. They are ineffective for modern threats, because they give admins, key processes and attackers implicit access to plaintext. Ubiq’s developer-first encryption-as code platform eliminates this gap and bridges the divide between engineering and security teams. Lightweight, prepackaged encryption libraries and code that can be easily integrated into any application for native client-side cryptography and set-and forget key management. -
31
AWS Certificate Manager
Amazon
AWS Certificate Manager allows you to easily create, manage, and deploy private and public Secure Sockets Layer/Transport Layer Security certificates (SSL/TLS), for use with AWS services as well as your internal resources. SSL/TLS certificates can be used to protect network communications and establish the identity websites on the Internet. AWS Certificate Manager automates the tedious manual process of purchasing, uploading and renewing SSL/TLS certificate. -
32
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption provides protection for sensitive data with strong encryption, key management, and auditing. Encryption is essential for protecting confidential information and expediting compliance to PCI-DSS and other state privacy laws. Ransomware can attack any file it can access, including connected devices, mapped network driver, shared local networks, cloud storage services, and cloud storage service that are mapped to infected computers. Ransomware doesn't discriminate. Ransomware encrypts all data files it has access to, even the IFS files. Anti-Ransomware quickly detects cyber threats of high volume from an external source and isolates them. It also protects performance and prevents data from being damaged. -
33
BestCrypt
Jetico
Data breaches are increasing at an alarming pace. Information and records containing personal information are being lost, stolen, or leaked. Data encryption is a great way to protect your data against both physical and digital threats. Data protection at the source is essential to any information security strategy. Data encryption protects sensitive data from data leaks, data theft and regulatory compliance. BestCrypt Volume Encryption 5 offers increased resilience against brute force attacks, which is one of the easiest and most effective ways to hack your system. Users can now customize the parameters of scrypt's key derivation algorithms, providing extra security against password-iterating attack. Data shelter, a new utility from us, provides an extra layer of protection for data in use, helping to secure files while you view or modify them. -
34
JM-Crypt
JM-Crypt
$2.99 (Android) - $9.99 (PC)Multi-platform, low-cost and professional software (Windows PC - Android Mobile) that encrypts sensitive data like photos and documents to protect them against theft or ransom. Ideal for VIPs and liberal professions like lawyers, doctors, etc. Check out our detailed product sheets on MS Store – "JM-Crypt PC" and Play Store – "JM-Crypt Mobile". Our software install on your device locally. No remote servers, no third parties, no pub, no IT backdoor and this for a derisory cost and unlimited duration. JM-Crypt uses the best known certified and official algorythm : AES-256 – CBC – PKCS with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. The PC version allows serial encrytion, much better than full disk encryption as this method doesn't slow down your computer's performance, "JM-Crypt PC" can handle for fast encryption any folder or file extention of your choice. -
35
DropSecure
DropSecure
$10 per monthDropSecure ensures that your keys to unlocking your data are never shared to anyone you don't want to share them with, even us. This means that you can enjoy complete privacy with our military-grade encryption technology and file transfer technology. Find the best way to share documents. DropSecure's mission is to empower you with technology that protects digital assets in a simple and hassle-free way. DropSecure protects you privacy and protects your data using military grade algorithms before they leave your device. We offer the best technology to protect your data from data centers. You are always aware of who has access your sensitive documents, regardless of whether you are a business, individual, or an enterprise. Most importantly, you are the only one who has access to your documents. Not even us. -
36
Cryptomator
Skymatic GmbH
Lock your cloud. Cryptomator gives you the keys to your data. Cryptomator quickly encrypts all your data. After encryption, you can upload your data protected to your cloud service. You can take control of the security and privacy of your data. Cryptomator is an easy tool for digital self defense. It allows you to secure your cloud data independently and by yourself. Most cloud providers either encrypt data only when it is transmitted or keep the keys for decryption. These keys can be stolen or copied and misused. Cryptomator gives you the keys to your data. Cryptomator makes it possible to access your files from any device. It is easy to use and seamlessly integrates with the cloud. Cryptomator's technology is up-to-date and encrypts files and filenames using AES and 256 bits key length. Cryptomator allows you to create a password for a folder (which we call a vault) within your cloud. That's it. -
37
Evervault
Evervault
$395 per monthEvervault can help you go from zero to audit ready in less than one day. Evervault is compatible with all cardholder data flows so you can collect PCI data in a compliant manner for processing, issuance or storage. In most cases, our PCI scope will be reduced to the SAQ A set of controls -- the smallest PCI DSS control set. We will work with you to fully understand your architecture, and make recommendations on how to integrate Evervault in order to reduce your compliance scope to the maximum. We'll help you integrate Evervault using one of our templates, and then we'll verify your integration to make sure it's fully-compliant. We will provide you with a PCI DSS policy and procedure bundle that is audit-ready, as well our PCI DSS Attestation Of Compliance (AoC). We'll introduce you to an Evervault-trained auditor. -
38
Mailprotector
Mailprotector
Mailprotector offers award-winning email experiences only through our incredible partner resellers. No plugins or apps required to use encrypted email. Bracket has made email encryption fun! Bracket will handle the rest. All you have to do is wrap brackets around [subject] in any email program on any device. Total email security that filters out all junk mail. CloudFilter provides full-stack protection against annoying spam, crippling email-based viruses and phishing attacks. It's easy to use, efficient, and effective. Protects against spam proliferation and prevents sensitive or damaging data being leaked via email. SafeSend extends CloudFilter's outbound filtering to include custom content rules and more. -
39
Powertech Encryption IBM i protects sensitive data with strong encryption, tokenization and integrated key management. Powertech Encryption allows organizations quickly and efficiently to encrypt data fields, backups, and IFS files using its intuitive screens and proven technology. With its intuitive screens, proven technology, and database encryption software, organizations can quickly and efficiently encrypt data fields, backups, IFS files, and other files. Powertech Encryption is trusted by organizations around the globe to protect confidential data on IBM i (iSeries and AS/400) as well as data from distributed system from both internal and external hackers.
-
40
SAV7
SAV7
SAV7 encrypts any file type with AES 256 and generates an encrypted key to restore files. The key file is required to restore encrypted files. The key file is required to decrypt files. SAV7 AES 256 Encryption uses the latest encryption technology based upon AES (Advanced Encryption Standard). This technology provides reliable security for your data by combining symmetric encryption, message authentication codes (MACs), and authentication. The AES algorithm is one of the most popular encryption algorithms in the world. It is used by governments, banks and other organizations around the globe. SAV7 protects your sensitive data from unauthorized access using a robust encryption and authentication method that adheres to current security standards. -
41
NordLocker
Nord Security
$1.49 per month 2 RatingsLeading-edge encryption at your fingertips. We use the most sophisticated ciphers and principals, including Argon2, AES256 and ECC (with Poly1305, EdDSA, and XChaCha20), to ensure your files are secure. Think about all the personal files that you would rather keep private. You can prevent them from falling into the wrong hands or being used in malicious ways. Finances, IDs, passwords. This information could lead to identity theft and loss of money. NordLocker provides top-notch security for sensitive data. NordLocker secures your sensitive data from prying eyes, so it doesn't matter if it's your diary and secret music collection. NordLocker will protect your files and show your professionalism when you share your work with clients. -
42
Cypherix Secure IT
Cypherix Software
$29.95SecureIT File & Folder Encryption software from Cypherix is a feature-rich, easy-to-use program that protects your files and folders with 448 bit Blowfish encryption. It comes with a powerful and customizable file shredder. SecureIT File Encryption software can generate self-decrypting emails that allow the user to send encrypted/secure emails to anyone. The recipient does not need to have a copy. This encryption software is so strong that it makes it statistically impossible for anyone to access the data. It has a virtual keyboard and a privilege mode that can prevent keyloggers from capturing keystrokes. SecureIT is very easy to use. SIT is designed for all computer users to meet their growing privacy and security needs. The software is designed to be easy to use and incorporates the latest technology. This ensures total security, with minimal learning curves and maximum convenience. It runs on any version of Windows. -
43
Secure email for the entire world Because everyone has the right of private communication. Flow is the best email solution for traditional email and compatible with most email clients. Volcano, our free, open-source mail client, takes full advantage of Dark Internet Mail Environment. Magma, our open-source server for the Dark Internet Mail Environment, is perfect if you need to host secure email. We are pioneers in encrypted email and believe that everyone has the right to secure communication. We are revolutionizing the way the world communicates and protects digital privacy by establishing secure encryption standards and technologies.
-
44
Fabasoft Secomo
Fabasoft
Fabasoft Secomo offers true end-to-end encryption with its encryption architecture. Encryption is performed at the workplace or on a mobile device, and not in the cloud. This ensures that encryption is done from the sender to the recipient. The Fabasoft credo of "Continuous Protection through Encryption" means that only you have access the Fabasoft Secomo as well as your settings. Fabasoft does not have access to your keys or interfaces to the appliance. Fabasoft Secomo, an appliance that includes Fabasoft Secomo and two highly available servers within a network, is called Fabasoft Secomo. The hardware security modules of the servers meet the requirements for FIPS 140-2 Level 4. Certification for physical security. Fabasoft Secomo supports client certificates for authentication. You can control who has access to the security appliance, and you can work with encrypted documents. Fabasoft Secomo is easy to use and has its own management interface. -
45
Boxcryptor
Boxcryptor
Boxcryptor secures your company's data in the cloud, including OneDrive, SharePoint and Dropbox. Boxcryptor encrypts files directly on your device. This ensures that the data is encrypted before it is transferred to the storage service of your choice. Boxcryptor runs on Windows, macOS and iOS. Work cross-platform with no limitations. Boxcryptor provides security for over 30 cloud providers. Protect your NAS and file servers as well as local data. Boxcryptor protects information confidentiality while the cloud offers availability and backup options. Boxcryptor was audited by Kudelski Security's security experts. The software's quality and security are verified. You can confirm sign-ins using 2FA on a second computer. SSO, SCIM or Active Directory support makes it easier to manage users. Boxcryptor allows you to collaborate securely in your team or with partners. -
46
Quantum Origin
Quantinuum
Experience the world's only quantum-computing-hardened encryption keys, ensuring provably superior protection and allowing you to seamlessly strengthen your existing cybersecurity systems for enhanced security today, and into the future. Every organization has sensitive data that needs to be kept secret. Quantum Origin gives your organization a long-term advantage against cyber criminals by adding unmatched cryptographic power to existing cybersecurity systems. To maintain the trust of your customers, shareholders and regulators, you must adapt and strengthen your cybersecurity foundations. Quantum Origin demonstrates your commitment to stay ahead of potential threats. Quantum Origin verifiably enhances the cryptographic security around your technology and service, proving that you take privacy and security as seriously as your customers. Let your customers feel secure knowing that their data is protected with the latest in cryptographic protection. -
47
Polar Crypto Component
Polar Software
$239.00/one-time/ user Polar Crypto Component provides unbreakable encryption functionality to your Windows applications. It allows you to create your own security systems immediately or to integrate it into existing systems, increasing their security and performance. Polar Crypto uses the most recent encryption technology and includes full source code written using MS Visual C++. Polar Crypto is an ActiveX component and DLL component that can be used whenever secure information, authenticity, and data integrity are required. Absolute confidentiality is required in all business transaction applications. Digital signature creation and validation Applications used in e-commerce websites to store sensitive information, such as credit card details of clients. Desktop applications that encrypt confidential files on your PC or computer network. -
48
SWISS SECURIUM
ALPEIN Software SWISS AG
$188.55 per monthSWISS SECURIUM, a cloud-based solution for businesses, is designed to provide highly secured collaboration and encrypted communication. The platform is hosted exclusively in Switzerland and adheres to the strict data protection standards of the country. All data is encrypted and only accessible to authorized users. The platform includes wiretap-proof voice telephony and video conferencing, an encrypted instant messaging service that supports multi-user chats, file transfers, a dedicated e-mail service, seamless data transfer capabilities, and a convenient, password-managed email. The platform offers video conferencing and remote desktop access, both of which are integrated into an intuitive interface. Administrators can benefit from a simple interface for managing user administration, access rights and policies, VPN configurations and two-factor authentication. Designed to meet small and medium-sized businesses and larger organizations' needs. -
49
BooleBox
Boole Server
BooleBox, a content security platform, protects clients' data integrity and confidentiality from unauthorized access. It also ensures the highest level encryption to protect sensitive information from hackers. Users can now create, edit, share, and classify files and folders without compromising their usability thanks to an advanced encryption system. We protect your data wherever it is: at work, in transit via email, in shared projects, in the cloud, in the cloud, in transit via E-mail, in shared projects and on the most popular platforms such as Windows, Outlook and Gmail, OneDrive, SharePoint, and OneDrive. Because we understand the potential digital vulnerabilities of your data, we can protect them like no other. It doesn't abandon it, and it follows it everywhere! We protect large amounts data in many business sectors. Since 2011, we have been doing this every single day. -
50
Quantum Xchange
Quantum Xchange
Quantum Xchange, a leader in the industry for advanced cryptographic management systems, is designed to protect data in motion from current and emerging cybersecurity threats. This includes those posed by quantum computer advancements. Their comprehensive platform addresses single-points of failure in encryption to ensure robust data security today, and quantum-safe protection in the future. CipherInsights is a key offering of Quantum Xchange, a tool which enables organizations discover, catalog and prioritize cryptographic risk within their networks. This continuous monitoring allows for proactive identification of vulnerabilities and remediation, thus improving the security posture of an organization. Phio TX offers a quantum-safe, affordable, and crypto-agile solution to further strengthen data security. It seamlessly integrates into existing IT infrastructures and enables the deployment of post quantum cryptographic algorithms with minimal performance costs.