Best RightsManager Alternatives in 2025
Find the top alternatives to RightsManager currently available. Compare ratings, reviews, pricing, and features of RightsManager alternatives in 2025. Slashdot lists the best RightsManager alternatives on the market that offer competing products that are similar to RightsManager. Sort through RightsManager alternatives below to make the best choice for your needs
-
1
Psono
esaqa GmbH
92 RatingsPsono, a self-hosted and open-source password manager, prioritizes keeping your data secure. It encrypts and stores your credentials in a manner accessible only to you, while also offering encrypted access-sharing with your team. Boasting a range of features, Psono facilitates easier data management and password accessibility than ever before. Its multi-level encryption begins with client-side encryption, ensuring genuine end-to-end encryption for password sharing, and is further bolstered by SSL and storage encryption. The complete code is subject to transparent public audit possibilities, underscoring that true security stems from precise encryption rather than the obfuscation of security weaknesses. Opting for a self-hosted credential manager like Psono allows you enhanced access control and eliminates dependency on public services for data storage, asserting itself as one of the most secure password managers that genuinely prioritizes client online safety on user-hosted servers. -
2
Locklizard Safeguard PDF Security
LockLizard
$500.00/month Locklizard protects PDF files from piracy, leakage, and misuse. Unauthorized access to documents is prevented and only authorized users are allowed to use them. Stop the theft of confidential and sensitive information, intellectual properties, training courses, reports, ebooks, and other trade secrets. Securely share and sell documents, prevent data leakage, and enforce compliance. You can lock documents to devices and locations, dynamically add watermarks, control expiry, stop printing and copying, and revoke access at anytime. You can track how your documents are used. Locklizard employs strong encryption, DRM, and licensing controls that are US Gov strength to ensure that your documents remain fully secure regardless of where they are located. -
3
Datalogics Inc.
$0 per month 35 RatingspdfRest API Toolkit was made by developers, for developers. Rapidly integrate PDF workflows with your business applications, simply and seamlessly. pdfRest API Toolkit includes all the PDF processing tools you'll need, designed and developed by digital document experts with decades of experience to make your job easy: PDF to Word, PDF to Excel, PDF to PowerPoint, Add to PDF, Extract Text, Query PDF, Convert to PDF, PDF to Images, Convert to PDF/A, Convert to PDF/X, Compress PDF, Linearize PDF, Flatten Forms, Flatten Transparencies, Flatten Annotations, Flatten Layers, Merge PDFs, Split PDF, Encrypt PDF, Decrypt PDF, Restrict PDF, Watermark PDF, Import Form Data, Export Form Data, OCR PDF, Upload Files, Zip Files. Clear documentation with intuitive endpoints and parameters. Start with sample code in .NET, JavaScript, Python, PHP, and cURL for every endpoint. Gold-standard processing powered by Adobe® PDF Library™. Free to get started with no commitment. Affordable pricing for projects of all sizes. pdfRest was designed for developers, by developers to make working with PDFs as easy and intuitive as possible. Flexible APIs can be called from any language capable of making an API request. Send your first API call in -
4
Investintech PDF Library SDK
Investintech PDF Solutions
With PDF library SDK, you can seamlessly integrate PDF editing, parsing, and rendering functions into your projects. Multi-platform shared library (dll.so and dylib), with a C-compatible interface. C#.Net, Python, Java 8, C++ 11, libraries/modules. APIs for Linux and Windows. Many interface functions are available to transform and create new content for PDF files. This allows for wide flexibility and a wide range of options, allowing for tailor-made implementations that meet your specific project's needs. Follow the portable document format specification guidelines to ensure efficient use of multi-core CPUs. Use electronic signatures, with or without cryptographic security layer. Encryption and decryption of PDFs (using a password-based encryption handler). Document structure manipulation (create/delete, move, insert and extract pages), resize and rotate pages. -
5
PDFEncrypt
PDFEncrypt
FreePDFEncrypt is a open-source, free utility that encrypts PDF files using standard PDF algorithms. When a document's contents are encrypted, they become unreadable. A document can be decrypted by an authorized user to gain access to its contents. The user must enter the password to view a PDF document that is encrypted. PDFEncrypt allows you to encrypt PDF documents without having to buy Adobe Acrobat or upload confidential PDF files to a server. The app runs directly from your Windows PC. It allows you to specify the password (required for opening the document), as well as numerous options and permissions that can be applied to the PDF file. -
6
Treeno Document Management
Treeno Software
$50 per monthTreeno Document Management offers all the features and functions you would expect from an enterprise-class electronic file management system, but at a fraction of the cost. Treeno Document Server Software allows for file storage and electronic document management. Treeno's industry standard SSL security ensures that all information can be encrypted during transmission. Treeno uses a comprehensive security model that is based on permissions of users and groups to protect your organization's information. All documents and all activities are fully audited. The Document Server's built in ability to recognize and generate barcodes simplifies workflows and the processing of scanned items. System administrators can easily set up and configure file structure, metadata, or document type fields without IT involvement. Treeno Document Management Cloud is also known as Treeno Document Management SaaS. -
7
Nimbus Portal Solutions
Nimbus Portal Solutions
$22.50 per monthSecurely share documents between staff and clients - Nimbus uses the best data security software features in the world. It also implements best practices for your security and safety, including both physical and electronic security measures that conform to industry standards like ISO 27001 (Information Security Management), and ISO 32000 ("Document Management”). Our file security software features ensure that all file data and metadata are transmitted over encrypted channels (https). This is something you won't find anywhere else. Nimbus is hosted and replicated in a variety of secure, world-class data centres that are local to each region. This gives customers maximum confidence in the performance our file protection system. Only authorized users have access to user files. Self-managed unique logins protect your login details and provide complete privacy. -
8
Ultiboard
NI
$ 2,816Ultiboard is a software for designing and layout printed circuit boards. It integrates seamlessly with Multisim, allowing for faster prototyping. Ultiboard software allows for efficient PCB layout and routing in a configurable environment. It allows you to place copper and parts with manual precision, defining critical board elements. You can quickly create a design using its automated functionality. You can easily manage, control, and create any board layout using the advanced spreadsheet view, toolbox, or design wizards. Integration with Multisim software is seamless. This allows for easy schematic transfer to the PCB. Forward and backward annotations allow for design iteration management. Export industry-standard file formats like Gerber and DXF are available to complete the design flow, from schematic to layout. Our software-connected, tailored approach is designed to help you engineer the next step. -
9
pdfRest API Toolkit Self-Hosted
Datalogics Inc.
$0.242 per hour 1 RatingWatermark PDF, Add to PDF, Query PDF, Convert to PDF, PDF to Images, Convert PDF Colors, Convert to PDF/A, Convert to PDF/X, Compress PDF, Linearize PDF, Flatten Annotations, Flatten Layers, Flatten Transparencies, Merge PDFs, Split PDF, Encrypt PDF, Decrypt PDF, Restrict PDF, Extract Text, OCR PDF, Upload Files, Zip Files. Our RESTful API is ready for production, so you don't have to reinvent the wheel when creating your own products and solutions. You have full control over your backend infrastructure. Our private cloud service allows you to control the entire process, including the documents. pdfRest API Toolkit Self-Hosted can be set up in just a few clicks from the AWS Marketplace. You can self-host a production-ready server to integrate the API in your own service or to automate your internal document workflow. Pay-as-you go pricing. Many business applications require complete ownership of your backend with very little or no communication with outside servers. You can create an EC2 instance to host our API, which will give you complete ownership of all files on your server. -
10
FormatPDF
FormatPDF
$4.90/month FormatPDF is a website that offers a variety of online tools to work with PDF documents. These tools include PDF conversion, merging, splitting, compression and encryption, as well editing and annotating PDF files. FormatPDF allows users to convert a variety of document formats into PDF. This includes Word, Excel and PowerPoint. You can also merge multiple PDF files into one document or split large PDFs into smaller ones. FormatPDF.com provides tools for converting and manipulating PDF documents. FormatPDF.com also offers features to improve the security and quality of PDF documents. The website offers tools to compress PDF files. This can be used to reduce large documents' sizes for sharing and storage. If they have the right credentials, users can encrypt PDF files using passwords to restrict access or decrypt protected files. -
11
Matrix
The Matrix.org Foundation
An open network for secure, decentralized communication. Matrix is an open-source project that publishes Matrix, the Matrix open standard for secure and decentralized real-time communication. It also includes its Apache licensed reference implementations. Matrix provides simple HTTP APIs and SDKs for iOS, Android, Web to create chatrooms, chatbots, and direct chats. It also includes end-to-end encryption and file transfer, synchronized conversations history, formatted messages and read receipts. Matrix provides state-of-the-art end-to-end-encryption via the Olm and Megolm cryptographic ratchets. This ensures that only intended recipients can decrypt your messages and warns you if any unintended devices are added to the conversation. Matrix's ability to connect existing platforms into a global open communication matrix is what gave it its name. Matrix's core concept of bridges is to make it as simple as possible to write. Matrix provides the most common language to link the networks. -
12
Ubiq
Ubiq Security
$0.001 per encryptEncrypt your sensitive data before leaving the application so that the storage layer and adversaries only see ciphertext. Client-side encryption that is native to the application protects data against sophisticated attackers, supply chain attacks, and internal threats. Most at-rest encryption solutions - transparent disk encryption, full disk encryption, etc. They are ineffective for modern threats, because they give admins, key processes and attackers implicit access to plaintext. Ubiq’s developer-first encryption-as code platform eliminates this gap and bridges the divide between engineering and security teams. Lightweight, prepackaged encryption libraries and code that can be easily integrated into any application for native client-side cryptography and set-and forget key management. -
13
PDF Master
PDFMaster.app
FreePDF editor made for modern work. Simple to Convert and easy to edit. Manage all your PDF files in one place. Drag and drop your PDF file into PDF Master. Add elements (text, images, etc.) Using the editor. Download, share or approve the modified document. Our converter uses advanced encryption to protect your sensitive data during the conversion process. We protect your privacy with industry-standard encryption. No need to install any apps or extensions. Convert files to and from popular operating systems including Windows, macOS and Android. Convert files on any device, anywhere, and at any time using your browser. No technical knowledge required. You can upload or drag&drop a file onto the platform. Choose the format and edit it as you wish. -
14
Red Hat Ceph Storage
Red Hat
Red Hat®, Ceph Storage is an open storage solution that can be scaled massively and simplified for modern data pipelines. Red Hat Ceph Storage is designed for data analytics, machine learning (AI/ML), emerging workloads, and other applications. It offers software-defined storage on any industry-standard hardware. You can scale to unprecedented levels of storage, up to 1,000,000 objects, and beyond, without compromising performance. No downtime required to expand or shrink storage clusters. Get the agility you need in order to get to market quicker. You can get started faster with dramatically simplified installation. With streamlined operation, monitoring and capacity management, you can quickly gain insight from large amounts of unstructured information. Integrated data protection and security features include client-side encryption and object-level encryption. This will protect your data from external threats and hardware failures. You can easily manage backup and recovery from one point of control and administration. -
15
GdPicture.NET PDF SDK
GdPicture.NET
1 RatingGdPicture.NET PDFSDK is an intuitive API that allows you to create fully-customizable apps for any software development. Your applications can now have a fully-featured and customizable viewer. This viewer is available for all platforms and displays complex files immediately with a clear rendering and full Unicode support. All versions of PDF and pdf/A as well as 100+ document, office and image formats. You can add thumbnails, annotations and signatures. Redaction, encryption, text search and more. GdPicture.NET PDFSDK allows you to create compliant, structured, and secure PDF files (all versions, including PDF 2.0). You can even create accessible PDFs using PDF/UA generation features. You can make your PDFs available for long-term archiving using PDF/A compliance, or you can generate PDF files for the Web using linearization. You can also add layers and transparency to other contents. -
16
TCPDF
TCPDF
FreeTCPDF is one of the most active open-source projects in the world. It is used daily by millions of people and is included in thousands of CMS and other web applications. External libraries are not required for basic functions, all page formats, custom pages formats, units of measure, and custom margins. UTF-8 Unicode, right-to-left languages. TrueType Unicode and OpenType Unicode. TrueType, OpenType Unicode and TrueType fonts. Font subsetting. Methods to publish some XHTML + HTML CSS code, Javascript and forms. Images, graphics (geometric figures), as well as transformation methods. Supports JPEG and PNG images natively, all images that are supported by GD (GD2, GD2PART and GIF), all images that are supported via ImagMagick, and all images that are supported by GD (GD2, GD2, GD2PART and GIF), and all images that are supported by GD (GD. Automatic page header/footer management. Document encryption up to256-bit, digital signature certifications and transactions to UNDO orders, as well as PDF annotations including links and file attachments. -
17
Javelin PDF Reader
Drumlin Security
FreeJavelin PDF readers offer all the core functionality required to view standard PDF files as well as encrypted PDF files using Drumlin Publisher (.drmz or.drmx) files. These readers can display internal and external hyperlinks, contents/navigation tree, a range page display formats, as well as document text searching, annotation, markup, and more. Encrypted files are safe against copying and onwards distribution. You may have restrictions on how they can be printed and if they expire. These settings can be found in the Javelin readers' properties or info facilities. The Mac OSX/Catalina Javelin3 software is recommended for visually impaired users. This software supports text-to speech conversion. Javelin can be used on a Mac or PC connected to a large corporate network that has a restricted firewall. -
18
PDF Studio Viewer
Qoppa Software
PDF Studio Viewer is a multi platform document reader that is dependable and very simple to operate. PDF Studio Viewer has the ability to annotate documents and fill documents that are interactive. To experience an upgraded version of this product, you can check out PDF Studio Standard and PDF Studio Pro. Features included in PDF Studio Viewer: -Display PDFs with high fidelity -Annotate & Markup PDFs -Fill & Save Forms -Render Digital Signatures & Layers -Advanced User Interface -Advanced Print & Search Options -Document Storage Integrations -DocuSign© Integration -
19
PDFBox
Apache Software Foundation
Apache PDFBox®, an open-source Java tool that allows you to work with PDF documents, is the Apache PDFBox®. This project allows you to create new PDF documents, manipulate existing documents, and extract content from existing documents. Apache PDFBox also contains several command-line utilities. Apache PDFBox is licensed under the Apache License 2.0. Extract Unicode text from PDF files. Split a PDF into multiple files or merge multiple PDF files. Fill out a PDF form or extract data from PDF forms. Validate PDF files against the standard PDF/A-1b. Use the standard Java printing API to print a PDF file. You can create a PDF file from scratch using embedded fonts and images. Save PDFs as image files such as PNG and JPEG, and digitally sign them. You can also view the export control information for the encryption features in Apache PDFBox. -
20
Secure My Files
SecuSimple
$14.99 one-time paymentSecure My Files Mini or SMF, is a JavaScript library that encrypts documents using browser-based encryption. SMF uses symmetric encryption algorithms (AES using a 256-bit Cypher) to encrypt or decrypt files. Secure My Files is an application that can be used as such. The sources can be deployed on your own server. Everything is static so any web server can run it. SMF can be used as a library. First, you need to add the JavaScript script to the page. A password is required to encrypt or decrypt files. Github has the source code available for everyone to view. Everyone can contribute to security by detecting and fixing bugs. Our servers and we are located in Europe. Secure My Files can be customized to your liking. Use as a library in a custom application. -
21
DRACOON
DRACOON
Project managers can create data areas and assign authorizations independently, which allows IT departments to work more efficiently and effectively. DRACOON data rooms prevent file duplicates because all employees have access to the most recent documents at all times. They can also work on files with both internal and external employees. For project coordination, user rights and file request deadlines can be used. GDPR-compliant email attachments and complete emails sent via DRACOON Outlook. Rely on end to end encryption that also includes client-side encryption. It offers the highest level of protection for your data. This encryption is so secure that no one, not even DRACOON or admin, can decrypt your data. The key remains with the owner and can be used at any time. This is how many other providers handle it differently. -
22
Xecrets Ez
Axantum Software AB
€15/year Xecrets Ez is a simple desktop application that allows you to encrypt files on Windows, Mac or Linux. It is compatible with AxCrypt and uses the same code. However, it is less complex, and focuses on delivering only the core functionality without any bells and whistles. It's a great option for personal daily use at a much lower cost than AxCrypt. Xecrets Ez is not dependent on Internet, administrative privileges, or installation. It allows you to encrypt and decrypt files and open them for editing with just a few clicks or drag-and-drop. It is a frontend for Xecrets Cli which is an open-source and free command-line program that handles encryption, decryption, and secure wiping. The command line is also available for download and can be used separately to script and integrate into other software. -
23
Keywhiz
Keywhiz
Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes. -
24
LEADTOOLS Imaging SDK
LEADTOOLS
LEADTOOLS ImagingSDK Technology provides the tools that developers need to add powerful imaging technology into their applications. LEADTOOLS Imaging features are based on more 32 years of experience in imaging development. They include image compression, image viewing, more then 200 image processing functions and image viewers. Common dialogs, TWAIN and WIA scanning, screen capture and printing. LEADTOOLS allows developers to create applications that can load, save, convert, and convert many proprietary and industry-standard formats. LEAD Technologies is committed in maintaining and expanding the most extensive support for file formats on the marketplace. It currently supports more than 150 raster and vector file formats as well as sub-formats. -
25
FileAgo
FileAgo Software Services
$4 per user per monthFileAgo is the only software that combines Waterfall and Granular Permission models. This allows users to control access and restrict data like never before. FileAgo offers both control and ease-of-use for users and organizations. FileAgo allows you to securely manage the data of your teams in a centralised cloud storage. You can also restrict access and allow file sharing. Collaborate with your coworkers to edit office documents in real-time via our built-in Collabora Online editor and Microsoft Office for the Web. FileAgo's flexible and flexible permission model for folders and files is built to protect sensitive files. This is our top priority. The data is protected with AES256 encryption and stored at datacenters that have passed security certifications and industry compliances. -
26
SilicaCAD Professional is a 2D/3D DWG native CAD for general-purpose drafts. This program is original and is based on 22 years of CAD experience (since 1999). SilicaCAD is very compatible with AutoCAD®. It offers more advanced features, and essential tools. CAD Software, Lifetime License, Affordable AutoCAD®, user need not have any training 100% DWG Files, Fully Compatible with AutoCAD®. o Conversion from DWG to PDF You can import and export to many formats o EasyArch plug in architectural 22.000 ready blocks Import Arch & BIM projects SilicaCAD Rendering Engine included
-
27
Aurora Files
Afterlogic Corp
$499 per yearYour files are stored in your cloud according to your rules. Aurora Files is an open source file storage platform that can be used by small teams or individuals. You can host your files on your own infrastructure and keep control of your data. You can share files and folders among your colleagues. You can use the server's remote or local S3-compatible storage as a backend. You can access your data using any WebDAV client, even the standard Windows Explorer. Rebrand Aurora Files using your colors, styles, and images (including mobile applications). Access your files on any device, iOS and Android. Allows for two-way sync between a user's local folders as well as the cloud. This is useful for personal and corporate storage. The link allows everyone to access folders and files. Developers will find it easy to modify code, integrate with other systems, and create and maintain plugins. Aurora Files also includes Paranoid Encryption module that provides strong AES256 browser-based encryption. -
28
Randtronics DPM easyCipher
Randtronics
Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database. -
29
PrimoPDF
Nitro Software
The world's most popular and free PDF creator allows you to create PDF files. You can convert any file into a 100% industry standard PDF in just one click. With just one click, convert almost any type of file into a 100% industry standard PDF file. -
30
WordPerfect Office
WordPerfect
$149.99 1 RatingWordPerfect Office Standard 2021 is the latest version to support your everyday work--from creating documents and presentations to creating stunning spreadsheets! This user-friendly suite allows you to publish your eBook, edit a pdf, import or export files into 60+ different formats and much more. We've simplified and made more intuitive the tools that you need to exceed expectations, whether you're a WordPerfect newbie or have been instrumental in shaping enhancements based on your critical feedback. The legendary word processor used by so many to create documents, brochures and resumes. Document control has never been simpler with Reveal Codes and compatibility of more than 60 file formats, including Microsoft. Quattro Pro™ allows you to create comprehensive spreadsheets that include budgets, receipts, expenses and invoices. Open, edit and create files including Microsoft Excel to organize, analyse and share data. -
31
File Viewer Plus
File Viewer Plus
$49.99 one-time paymentFile Viewer Plus 4 opens over 400 file formats. You can view dozens of file types such as Office documents and PDFs. With the built-in media player, you can play hundreds of audio and video formats. The file decompression tool can be used to extract files from archives. File Viewer Plus can also open less commonly used file formats. View Visio and Microsoft Project documents. Open source code files with syntax highlight. Email attachments can be opened and downloaded. File Viewer Plus is a great tool to view unknown files on your computer. File Viewer Plus can open hundreds of file formats. You can also edit, save and convert files. You can edit a Word document and save it to a PDF. Crop a raw image taken with a digital camera, and then export it as JPEG. The built-in batch convert allows you to convert thousands of files at once. -
32
FinalCode
Digital Arts
It was created with original technology and innovation. It is composed of "FinalCode Client", which encrypts and browses files and "FinalCode Server", which manages file authority information. , which doesn't require server construction or operation costs, and "FinalCode Ver.6 VA", which runs on our own server. It automatically encrypts files when they're created, saved, or download. It is just as easy to use, even if encrypted. It is also accessible to all users regardless of their security literacy, as encryption is transparent to them. We provide an executable API that allows you to call the encryption/decryption functions of "FinalCode" from internal business systems such as document management systems and workflow systems. -
33
StealthDisk Mobile
Security Group Six
$49.95 one-time paymentStealthDisk Mobile uses Virtual Disk Technology for secure and easy storage of all your important files. StealthDisk Mobile uses industry-leading encryption algorithms to create an encrypted virtual drive that encrypts or decrypts all data as you work. Once you're done, simply remove the StealthDisk volume. All your important files and documents will instantly be encrypted and hidden. You don't need to encrypt every file or every folder as other file encryption software. Our algorithms are all optimized and lightning fast! Our software processes data instantly, meaning that data is only decrypted when it's accessed. Other file encryption software decrypts or encrypts the entire file before it can be used. StealthDisk Mobile does all this automatically and only for the data you have access to, saving valuable time and resources. -
34
AWS Thinkbox Sequoia
Amazon
AWS Thinkbox is a standalone application that can be used for point cloud processing, meshing and meshing on Windows, Linux and macOS. It accepts point clouds and mesh data in a variety of industry-standard formats. Point cloud data is converted into a compact, fast-accessible intermediate cache format. Sequoia uses intelligent workflows that retain high-precision information efficiently. It displays all or a portion of the point clouds using adaptive views-dependent methods. Users can transform, cull and modify point cloud information, generate meshes out of point clouds, and optimize those meshes. The software allows users to project images onto meshes and points, and generate mesh vertex colors or UV-based texture from point cloud colors. It exports the resulting meshes into industry-standard mesh files and integrates with Thinkbox Deadline for point cloud data conversion and meshing on network nodes. -
35
Hush App
Syneidis
It is simple to encrypt your files. Secure file transfers for Android and iOS. Even if the user doesn't have the app, you can send encrypted files to anyone. Create a business account, invite people to join the team, and manage permissions. HushApp is very easy to use, regardless of whether you send or download files. We don't have any information on you, including your keys, files that you store or send, and we don't have any information about your keystrokes. HushApp allows you to send encrypted files to anyone who doesn't have the app. To protect your files, we use military-grade AES256 and RSA-2048 encryption standards. Our servers are also located in the European Union. Are you looking for ways to protect business communications or are you concerned about GDPR? Our app allows you to keep all work-related documents safe and private. HushApp makes it easy to send and protect files from any platform. HushApp allows you to enjoy peace of mind with end-to-end encryption. -
36
Fasoo Secure Email
Fasoo
Allow users to send encrypted documents via email without removing the encryption. This email-based DLP software allows for an exception to be made for encrypted documents by a process of approval, so that internal documents are always encrypted. The server decrypts documents after they have been approved. Decrypt documents automatically when users email them, without requiring that the sender request approval to decrypt it before sending it to the recipient. Maintain document security across your environment since unprotected files are not stored in the user's mailbox or PC. -
37
Seafile
Seafile
$16.00/year/ user Seafile is an open-source file sync and share solution that aims to improve productivity, reliability, and performance. Sync, share, and collaborate across devices and groups. Seafile's Wiki feature allows you to build your team's knowledge base. You can organize files into libraries. A library can be selectively synced to any device. You can increase your productivity with reliable and efficient file syncing. You can access files stored in the cloud from your local S: drive, without having to sync them. The server has a huge storage capacity that extends local disk space. Files can also be used offline. You can choose a password to encrypt your library. Before files are synced to the server, they are encrypted. The files are not accessible to anyone except the system administrator. Edit Wiki documents in Markdown format with built-in WYSIWYG Markdown editors. Our full-text search, file tagging and review features make knowledge management easy. -
38
ShareVault
ShareVault
2 RatingsA virtual data room, or VDR, is an essential tool to facilitate due diligence and other business transactions in which it is important to share documents in a controlled way. You can easily keep control of sensitive documents even if they are not under your IT department's control. ShareVault gives you visibility and control over everything, from remote shredding to user analysis. This allows you to focus on the deal, and not the data room. ShareVault Enterprise and ShareVault Pro have powerful Information Rights Management (IRM), which allows you to keep control over documents that are shared with third parties. Protected documents are AES256 bit encrypted and can only open by current rights holders. Documents can also be remotely "shredded". This means that a user can revoke their permission to open a document retroactively, even if they have already downloaded it. -
39
Razuna DAM
Razuna
$24.00/month Razuna is a hosted Digital Asset Management platform that allows you to collaborate, manage, share, and publish your organization's images, videos, and audio files online. Razuna DAM allows you to store your digital assets on your own server, or you can use a cloud storage provider like Amazon S3 or Eucalyptus, or you can deploy on your virtualization platform. Learn more about Razuna DAM Cloud. Your own Digital Asset Management system allows you to manage and publish any digital asset. Razuna supports all video, image, audio, and document formats. Smart conversion engines allow you to convert any asset into the correct format. Razuna DAM can store digital assets securely. This system is designed to protect your data. You can store your digital assets on your network, use SSL encryption and set user permissions. -
40
ScreenSharing
ScreenSharing
ScreenSharing is a lightweight, browser-based solution for screen sharing that allows instant sharing without requiring downloads. Key Features Users can easily initiate a new sharing session by clicking on the "SHARE SCREEN" button. The user can then choose the screen or application window that they want to share, and copy the generated URL to share with the audience. High-Quality Screen Sharing: It allows for crystal clear screen sharing, with adaptive quality that adapts to network conditions. This ensures a smooth viewing experience. Security measures: The service provides enterprise-level security. All screen sharing sessions use industry-standard protocols and end-to-end encrypted. Each session has a unique encrypted room ID which expires after usage. Users have full control of access and can terminate a session immediately if necessary. Cross-Platform compatibility: It works with all major browsers and OSes. -
41
Space
Space
$11 per monthSpace does not allow you to store different things on our platform. Your space is yours to control and you can access it through other interfaces if necessary. All files, transfers, and interactions in Space are end-to-end-encrypted, and only users have control of the decryption keys. Anyone can view our code and verify our privacy claims. Developers can also openly build on our Open Web stack. Online storage of files in a Space that only you can access and control. Your files and accounts keys are yours only. All files are automatically backed up to Filecoin as a decentralized layer. All Space accounts are tied to an Ethereum key pair that only you and your family have access to. You have the option to log in using Twitter, Gmail, email protected by Torus network, or high-privacy alternatives such as MetaMask or other crypto wallets. You can share with ease (email, social handles ENS, etc.). Privacy-first options (crypto addresses, hyperlinks) -
42
OpenDocMan
OpenDocMan
OpenDocMan, a web-based, free and open-source document management software (DMS), was written in PHP. It conforms to the ISO 17025 standard for document management and OIE standards. It offers web-based access, fine-grained access control, automated installation and upgrades, and web-based access. OpenDocMan was created under the GPL open-source license. This basically allows you to use the program at no cost and modify it in any way you like. If you have any questions or concerns, we welcome feedback. You get free document management software. IT managers and IT staff can delegate document management tasks to any number of staff members through user and group permissions. You can set permissions as restrictively as you like or as permissive as necessary. -
43
IAR Embedded Workbench
IAR Systems
Arm provides a complete development environment that generates fast, compact code, and allows you to have full control over your code. One Integrated Development Environment that includes project management tools and an editor. 8.400 examples projects with code examples, configuration files, and project templates are included. This gives every project a quick start. Our compiler experts created the IAR C/C++ compiler. It supports C and C++. It supports advanced global and target-specific optimizations and supports a wide variety of industry-standard image and debug formats. This compiles with most popular emulators and debuggers, including ELF/DWARF. It enables the creation of powerful embedded applications when combined with the complete linker/assembler. All 32-bit Arm Cores from all major vendors as well as selected 64-bit Arm Cores. You can choose from a variety of license options to best suit your company's needs. -
44
Open Web Systems
Open Web Systems
$4.94 per monthWe will not sell your data to anyone. We will never sell your data to anyone else. You will enjoy constant improvements thanks to a transparent and open-source community model that is free from lockins and paywalls. Open Web Systems is a collaboration of Collective Tools and The Open Co-op. It is managed by its members as cooperative. We are all working together to build a regenerative, commons-based economy. Your own, customizable, welcome screen that allows you to quickly link to your most important resources and tools. You can also search across all your files and applications simultaneously. You can create spreadsheets and documents, and collaborate with others via mobile, desktop, and web. Use powerful search to find files, share your thoughts and lock files until you are finished. -
45
SDS E-Business Server
Software Diversified Services
E-Business Server will provide the industry-leading encryption tools and security tools that you need if you store or transmit sensitive data via automated business processes. E-Business Server can be replaced without any additional cost. E-Business Server is an affordable and excellent option for small and large companies. However, this encryption solution is ideal for Fortune 1000 corporations, large enterprises, and government agencies that require large-scale data-protection across a variety platforms. These platforms include z/OS mainframes to distributed platforms (ie. Windows®, Linux, AIX, Solaris). E-Business Server integrates with a wide range of platforms and applications by using flexible APIs and PGP encryption. This protects encrypted data in motion and at rest. -
46
NuCypher
NuCypher
Manage secrets such IAM tokens and database credentials, as well as signing/encryption keys in dynamic environments. Access to sensitive data can be granted or revoked to an unlimited number of recipients. Encrypt data while protecting the confidentiality of the inputs. NuCypher's PRE network offers cryptographic access controls for distributed protocols and apps. NuCypher's NuFHE library allows secure, private computation on encrypted information by outsourced nodes. Fully Homomorphic Encryption is a type of encryption that allows for arbitrary, secure computations on encrypted data. This means that encrypted data can be processed without having to decrypt it first. The operations on encrypted data are performed as if they were being done on plaintext data. -
47
AWS Key Management Service
Amazon
AWS Key Management Service is a managed service which facilitates the creation of cryptographic keys to protect your data. It allows you to define permissions, monitor key usage and centrally manage keys and policies across all integrated services and applications. AWS KMS integrates seamlessly with other AWS Services, enabling seamless data encryption and control of access to keys that decrypt the data. AWS Encryption is a SDK that allows developers to integrate encryption and digital signature functionality directly into their applications. AWS KMS allows the generation and validation of hash-based authentication codes for messages to ensure their integrity and authenticity. The service uses hardware security modules that have been validated by the U.S. National Institute of Standards and Technology's Federal Information Processing Standards 140-2 Cryptographic Module Validation Program. -
48
SAV7
SAV7
SAV7 encrypts any file type with AES 256 and generates an encrypted key to restore files. The key file is required to restore encrypted files. The key file is required to decrypt files. SAV7 AES 256 Encryption uses the latest encryption technology based upon AES (Advanced Encryption Standard). This technology provides reliable security for your data by combining symmetric encryption, message authentication codes (MACs), and authentication. The AES algorithm is one of the most popular encryption algorithms in the world. It is used by governments, banks and other organizations around the globe. SAV7 protects your sensitive data from unauthorized access using a robust encryption and authentication method that adheres to current security standards. -
49
KodeFile
1SQ Technologies
The most difficult part of encryption is securing the encryption keys. Until now! KodeFile's Key On Demand Encryption, (KODE), generates and stores a unique Key for each file you encrypt. Your Confidants can then decrypt the keys by sharing the secret keys on demand. KodeFile does not have access to your files. You can store and share files separately (emails, cloud, flash drives, etc.). You are in complete control of your privacy. KodeFile creates and stores a unique key to each file you encrypt. Any key can be shared on demand. The keys are kept secret for everyone so they can't be shared with anyone. -
50
VolView
Kitware
FreeVolView is a free, open-source radiological viewer for clinicians that offers interactive, cinematic volume rendering in order to visualize DICOM data 3D. It runs directly in your browser, without installation. This ensures that data is kept secure on your computer. VolView provides interactive 3D cinematic volume renderings and supports drag-and drop functionality for DICOM. Users can select from a variety of color presets, adjust transparency and lighting, crop images and interact with 3D data for deeper insights. The application comes with standard 2D and 3-D controls, measurement tools and annotation features. It is constantly updated based on feedback from users. VolView is a locally installed web application that uses your computer's CPU, GPU and disk resources to process and visualize data, eliminating the need for cloud services or servers. It is open source and therefore freely available to clinicians.