Best Symantec Endpoint Encryption Alternatives in 2024

Find the top alternatives to Symantec Endpoint Encryption currently available. Compare ratings, reviews, pricing, and features of Symantec Endpoint Encryption alternatives in 2024. Slashdot lists the best Symantec Endpoint Encryption alternatives on the market that offer competing products that are similar to Symantec Endpoint Encryption. Sort through Symantec Endpoint Encryption alternatives below to make the best choice for your needs

  • 1
    Titaniam Reviews
    Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
  • 2
    Trustifi Reviews
    Top Pick
    Trustifi provides industry-leading email security solutions that help small, medium, and large enterprises manage threat detection, regulatory compliance and data encryption. Easily deployable on Outlook, Gmail, and any other email server via relay **Advanced Threat Protection** -Malware/ransomware virus detection and BEC attack prevention and alarms **Data Loss Prevention** --100% compliant HIPAA/HITECH and PII, GDPR. FSA, LGPD, CCPA and more **Encryption** -NSA-grade. Only select Enterprise customers have access the company branding and product white-labeling. One-on-one training for teams. There are many encryption requirements, so there is no one-size-fits all solution for email security. Many times, customized solutions are available on request and often free of charge.
  • 3
    Sophos Central Device Encryption Reviews
    Remote working has made it more critical than ever to protect computers and data. Full disk encryption is a critical first line of defense against theft or loss of laptops. Sophos Central Device encryption leverages Windows BitLocker as well as macOS FileVault to protect devices and data.
  • 4
    Trend Micro Endpoint Encryption Reviews
    Trend Micro™, Endpoint Encryption protects data on a variety of devices such as computers and laptops, desktops, USB drives and other removable media. This solution is available as a separate agent and combines enterprise-wide full disc, file/folder and removable media encryption to prevent unauthorized access or use of private information. You can manage all your users from one, integrated console. This console also allows you to use the same console for Trend Micro security products and endpoint protection. Endpoint encryption agents can be deployed to ensure your data is protected no matter what your mobile computing devices or organizational needs may change.
  • 5
    Trellix Data Encryption Reviews
    Trellix Data Encryption secures removable media and devices to ensure that only authorized individuals can access the data they contain. Deploy encryption policy through a single console, monitor encryption status and generate compliance reports. Choose from a wide range of policy options for securing information across devices, removable media, and files. All policies can be managed from one location. Trellix Native Encryption centralizes BitLocker management and simplifies FileVault management into a single console, available on-premises as well as via SaaS. This centralization of administrative tasks, such as encryption key and pin management, saves time and money for organizations that manage multiple operating systems.
  • 6
    ESET Endpoint Encryption Reviews
    This standalone encryption solution is easy to use and allows remote control of encryption keys and security policies for files on hard drives, mobile devices, and emails. Patented technology to protect data from all sizes of businesses. ESET Endpoint encryption is FIPS 140-2 certified with 256-bit AES encryption. ESET Endpoint encryption does not require a server to deploy and can seamlessly support remote users. From one dashboard, manage encryption on Windows and native macOS encryption (FileVault). ESET Endpoint encryption gives companies greater control over the protection of specific files, folders and virtual disks. Encrypting email attachments and restricting access for certain users to removable media can help protect data in transit and prevent leakage from outside. A dedicated ESET Endpoint Encryption console gives you full control over licensing, software features, security policy, and encryption keys.
  • 7
    BestCrypt Reviews
    Data breaches are increasing at an alarming pace. Information and records containing personal information are being lost, stolen, or leaked. Data encryption is a great way to protect your data against both physical and digital threats. Data protection at the source is essential to any information security strategy. Data encryption protects sensitive data from data leaks, data theft and regulatory compliance. BestCrypt Volume Encryption 5 offers increased resilience against brute force attacks, which is one of the easiest and most effective ways to hack your system. Users can now customize the parameters of scrypt's key derivation algorithms, providing extra security against password-iterating attack. Data shelter, a new utility from us, provides an extra layer of protection for data in use, helping to secure files while you view or modify them.
  • 8
    Folder Lock Reviews

    Folder Lock

    NewSoftwares.net

    $39.95/one-time/user
    1 Rating
    Lock your files with AES256-bit military-grade encryption to protect them from prying eyes. Keep prying eyes away! Folder Lock allows you to lock and hide files and folders in seconds. It allows you to Password Protect and prevents unwelcome eyes from seeing files, folders, or drives. Once you have locked a folder, it will disappear from its previous location and cannot be accessed except through the software interface. Folder Lock creates Lockers. You would place your money in a safe. Would you rather keep your files in a digital "Locker" that is safer than a bank vault? You can create "Locker(s)," which are protected with AES256-bit encryption. Accessing files does not require encryption or decryption. Simply copy them to Locker, and voila! They are encrypted instantly. Folder Lock provides a 2-way encryption method and backup that allows you to back up your encrypted 'Lockers’ online.
  • 9
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.
  • 10
    BitLocker Reviews
    BitLocker Drive Encryption integrates with the operating systems and addresses data theft or exposure from computers that have been lost, stolen or improperly decommissioned. BitLocker offers the best protection when used in conjunction with a Trusted Platform Modul (TPM) version 1.2.2 or later. The TPM is a hardware component that is installed in many computers made by computer manufacturers. It works in conjunction with BitLocker to protect user data and ensure that the computer is not tampered with when it was offline. BitLocker can be used to encrypt the Windows operating-system drive on computers without a TPM version 1.2. To start the computer or resume hibernation, the user will need to insert a USB Startup Key. To protect the operating system volume on a computer that is not connected to a TPM, you can use an operating-system volume password starting with Windows 8.
  • 11
    EncryptUSB Reviews
    EncryptUSB (by ClevX) is a tool that automatically encrypts USB drives. A portable software application protects data on the USB drive. EncryptUSB is designed to run without installing on a host PC. It operates directly from the portable drive, encrypting all files placed on it. EncryptUSB was developed with the security and compliance of users in mind who transfer sensitive documents and personal information via USB drives. It ensures that all files placed on your drive will be encrypted and password protected.
  • 12
    Sealit Reviews
    You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you.
  • 13
    east-tec SafeBit Reviews

    east-tec SafeBit

    east-tec

    $29.95 one-time payment
    east-tec SafeBit is a disk encryption program that protects your data from unauthorized access and information leaks. It features on-the-fly disk encryption, by creating virtual disk drives, where you can [hide files & folders](/safebit/hide-folders/), keep them encrypted all the time, but still work with these files just like you work with normal files. east-tec SafeBit is a disk encryption program that protects your confidential information from unauthorized access and data breaches. It's a great addition to computer privacy software. It allows you to install and execute programs in encrypted vaults. This will ensure that all your traces are encrypted inside the safe. Use east-tec SafeBit to encrypt files and folders on-the-fly. On-the-fly encryption is when data is automatically encrypted before it is saved, and decrypted after it is loaded. This is done without user intervention.
  • 14
    Cypherix Secure IT Reviews
    SecureIT File & Folder Encryption software from Cypherix is a feature-rich, easy-to-use program that protects your files and folders with 448 bit Blowfish encryption. It comes with a powerful and customizable file shredder. SecureIT File Encryption software can generate self-decrypting emails that allow the user to send encrypted/secure emails to anyone. The recipient does not need to have a copy. This encryption software is so strong that it makes it statistically impossible for anyone to access the data. It has a virtual keyboard and a privilege mode that can prevent keyloggers from capturing keystrokes. SecureIT is very easy to use. SIT is designed for all computer users to meet their growing privacy and security needs. The software is designed to be easy to use and incorporates the latest technology. This ensures total security, with minimal learning curves and maximum convenience. It runs on any version of Windows.
  • 15
    Cryptainer Pro Reviews
    Cryptainer Pro is a 448 bit encryption software. Simple and easy-to-use encryption software that creates encrypted vaults where sensitive information can stored. Cryptainer allows you to encrypt files and folders on any Windows PC. Password protect any folder or file with strong encryption. Cryptainer comes with a Password Strength and Monitor Meter that helps you create strong and effective passwords. One password gives access to the virtual drive, eliminating the need to memorize separate passwords for every encrypted file. Drag and Drop any data (documents, photos, entire folders, or even run programs), into a password-protected vault. Cryptainer is a great security tool because of its ease of use, deployment and versatility. Simple, Secure, Easy-to-Use. Save encrypted vaults to cloud storage providers. Compatible with all Windows versions. Every desktop should have this.
  • 16
    WinMagic SecureDoc Reviews
    SecureDoc is a solution for encryption and security management that protects data at rest. The software consists of two components: client software to encrypt and decrypt data, and server software to configure and manage the organization's laptops and desktops. SecureDoc uses a FIPS140-2 validated AES256-bit cryptographic algorithm to ensure compliance with industry regulations. The software protects sensitive data on multiple platforms (Windows, macOS, and Linux) with features such as pre-boot authentication, central management, and encryption.
  • 17
    Salesforce Shield Reviews
    With platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements.
  • 18
    Cryptomator Reviews
    Lock your cloud. Cryptomator gives you the keys to your data. Cryptomator quickly encrypts all your data. After encryption, you can upload your data protected to your cloud service. You can take control of the security and privacy of your data. Cryptomator is an easy tool for digital self defense. It allows you to secure your cloud data independently and by yourself. Most cloud providers either encrypt data only when it is transmitted or keep the keys for decryption. These keys can be stolen or copied and misused. Cryptomator gives you the keys to your data. Cryptomator makes it possible to access your files from any device. It is easy to use and seamlessly integrates with the cloud. Cryptomator's technology is up-to-date and encrypts files and filenames using AES and 256 bits key length. Cryptomator allows you to create a password for a folder (which we call a vault) within your cloud. That's it.
  • 19
    Cubbit for Teams Reviews

    Cubbit for Teams

    Cubbit

    €6 per user, per month
    Cubbit for Teams, a SaaS distributed cloud storage service, provides complete security for businesses. Cubbit is able to provide complete security because no one can access uploaded files except the service provider. Cubbit for Teams reinvents security by offering an easy-to use platform. Zero-knowledge and end to end encryption protects users as they save, sync and share their data. The web-app allows you to access information from any location at any time. Employee permissions can be managed with the click a button. Files can be shared without a limit on size and unsecured emails are replaced by Cubbit Private Links, a 100% secure sharing option that matches the encryption key to the folder. Cubbit can be more cost-effective than traditional data-centers by using a distributed architecture. This allows Cubbit to offer a much lower service price than its competitors. You will also save CO2 per file.
  • 20
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 21
    AxCrypt Reviews
    AxCrypt provides file and password security for private individuals and companies - with 256 bit AES encryption, available on Windows, MAC, iOS and Android. Our cloud storage awareness and key sharing feature allows you to key share files with your team members on Google Drive, Dropbox and OneDrive. This allows you to comply data protection regulations and protect your files from costly data breaches. AxCrypt Premium or Business also gives you access to our Password Management, where you can securely store and manage codes and passwords. AxCrypt supports over 14 language for example English, French, Spanish, Italian and German.
  • 22
    RMail Reviews
    RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files.
  • 23
    SecureZIP Reviews
    Large-scale data breaches continue exposing the weaknesses in traditional information security strategies. It is clear that network and device protection are not sufficient. Volume encryption, also known as full-disk encryption, is a single-use case approach that leaves data exposed at the data level. In highly regulated industries, persistent data-level encryption is a necessity. PKWARE's industry-leading technology compresses files, reducing file size by up to 95% Authorized users can share and decrypt encrypted files on any enterprise operating system. You can protect sensitive data using a variety encryption methods, including certificate-based encryption and password-based encryption. This allows for organization-wide control and consistent policy enforcement.
  • 24
    east-tec InvisibleSecrets Reviews
    east-tec InvisibleSecrets, a revolutionary file encryption and steganography software, allows you to encrypt files and folder structures containing confidential data. It also gives you the ability to hide files making them invisible to anyone. Use east-tec InvisibleSecrets to encrypt and hide file contents. It is a complete privacy and encryption software solution. We will also discuss other useful features such as password manager, file shredder, and program lock. east-tec InvisibleSecrets, a file encryption program, helps you protect your confidential data from prying eyes and unwanted access. It encrypts file or folder structures on your computer. It features strong file encryption algorithms that provide privacy protection. Protect files and sensitive information by hiding them.
  • 25
    DropSecure Reviews

    DropSecure

    DropSecure

    $10 per month
    DropSecure ensures that your keys to unlocking your data are never shared to anyone you don't want to share them with, even us. This means that you can enjoy complete privacy with our military-grade encryption technology and file transfer technology. Find the best way to share documents. DropSecure's mission is to empower you with technology that protects digital assets in a simple and hassle-free way. DropSecure protects you privacy and protects your data using military grade algorithms before they leave your device. We offer the best technology to protect your data from data centers. You are always aware of who has access your sensitive documents, regardless of whether you are a business, individual, or an enterprise. Most importantly, you are the only one who has access to your documents. Not even us.
  • 26
    iSecurity Field Encryption Reviews
    iSecurity Field Encryption provides protection for sensitive data with strong encryption, key management, and auditing. Encryption is essential for protecting confidential information and expediting compliance to PCI-DSS and other state privacy laws. Ransomware can attack any file it can access, including connected devices, mapped network driver, shared local networks, cloud storage services, and cloud storage service that are mapped to infected computers. Ransomware doesn't discriminate. Ransomware encrypts all data files it has access to, even the IFS files. Anti-Ransomware quickly detects cyber threats of high volume from an external source and isolates them. It also protects performance and prevents data from being damaged.
  • 27
    NordLocker Reviews
    Leading-edge encryption at your fingertips. We use the most sophisticated ciphers and principals, including Argon2, AES256 and ECC (with Poly1305, EdDSA, and XChaCha20), to ensure your files are secure. Think about all the personal files that you would rather keep private. You can prevent them from falling into the wrong hands or being used in malicious ways. Finances, IDs, passwords. This information could lead to identity theft and loss of money. NordLocker provides top-notch security for sensitive data. NordLocker secures your sensitive data from prying eyes, so it doesn't matter if it's your diary and secret music collection. NordLocker will protect your files and show your professionalism when you share your work with clients.
  • 28
    WinGPG Reviews
    WinGPG, developed by Scand Ltd., is a tray-based Windows application and a classic GPGv2 Distribution (we use the official cryptography without making any modifications). It supports the following operations - Encryption/Decryption (we offer automatic zipping at encryption time, so your files are ready to be transmitted via email or any instant messenger immediately) - Signature/Verification - Key management (create, import, export, revoke) WinGPG's main operational features include: WinNT Explorer support via context menus - Global shortcuts that work from the active explorer window, clipboard Clipboard support for files and texts WinGPG is simple to use. It only requires a batch file WinGPG can be used as a fully functional tool that allows the user to manage keys and files. WinGPG offers password protected keys, default keys, as well as other useful tricks.
  • 29
    Enveil Reviews
    We change the way organizations use data to unlock value. Data is the backbone for the digital economy. Enveil's award winning ZeroReveal®, solutions allow enterprises to securely and privately access data across organizational boundaries, jurisdictions and third parties. The interaction and results are never revealed. Our homomorphic encryption-powered capabilities and PETs provide a decentralized and efficient data collaboration framework that addresses business challenges such as data sharing, monetization and regulatory compliance. We offer the most advanced encrypted search, analytic and machine learning products in the market to protect data while it is being used or processed. This is the 'holy-grail' of secure data use. Enveil is a pioneering privacy-enhancing technology company that protects data for secure data sharing, usage, and monetization.
  • 30
    IceIT Reviews

    IceIT

    Quantum Knight, Inc

    0
    IceIT is a free desktop tool designed to make file encryption fast and effortless with cutting-edge, quantum-level security. For users needing more, IceIT provides commercial options that allow secure, private networking and continuous file sharing—no cloud accounts required. With IceIT, you can confidently use email, text, and other familiar communication channels without concern. Want to safeguard your backups? Just IceIT!
  • 31
    Skiff Reviews
    Skiff is an end-to-end private encrypted workspace that integrates with Mail, Calendar and Pages products to provide a completely secure environment for communication and collaboration. Skiff products have been designed with privacy and security in mind. All apps are built using end-to-end (E2EE) encryption, so you will never have to share sensitive data or private keys. Only you have access to the content of emails at all times. Free tiers are available in abundance Enjoy 10 GB free storage for all your emails, documents, attachments and notes. Create up to four free email aliases in order to protect your identity. Open-source and audited Skiff Mail is an open-source product that uses open-source cryptography and undergoes regular external security audits. You can find our whitepaper and source code at skiff.com. No trackers or Ads Upgrades can be made using crypto payments in a variety of currencies. - Your information is never sold, shared, or collected.
  • 32
    MOVEit Reviews
    The MOVEit Managed file Transfer (MFT), software is used by thousands worldwide to provide complete visibility and control of file transfer activities. MOVEit ensures the reliability of your core business processes as well as the safe and compliant transfer sensitive data between customers, partners, users, and systems. MOVEit's flexible architecture lets you choose the capabilities that best suit your organization's needs. MOVEit Transfer allows you to consolidate all file transfer activities into one system, allowing for better control over core business processes. It provides security, centralized access controls and file encryption, as well as activity tracking, to ensure operational reliability and compliance to regulatory requirements, SLA, internal governance, and regulatory requirements. MOVEit Automation can be used with MOVEit Transfer and FTP systems to provide advanced workflow automation capabilities, without the need of scripting.
  • 33
    Mimecast Advanced Email Security Reviews
    Mimecast Advanced E-mail Security is a robust email security solution that protects organizations from a variety of email-based threats including phishing attacks, malware, impersonation, and spam. Mimecast uses cutting-edge AI and Machine Learning to provide real-time threat prevention and detection in order to safeguard sensitive data and ensure business continuity. It provides advanced filtering and scans of incoming and emailed outgoing emails to reduce the risk of data breaches and help organizations comply with regulatory requirements. Mimecast's comprehensive reporting and management features enable IT teams to monitor and respond to threats efficiently, making it the preferred choice for businesses looking to enhance email security.
  • 34
    Panda Full Encryption Reviews
    Panda Full Encryption provides a first line of defense to secure your data in an efficient and simple way. It is a full-volume encryption system that increases security against unauthorized access by using established authentication mechanisms. Data encryption reduces data exposure and adds an extra layer of security and control for your organization. BitLocker activation can be monitored and enforced on Windows devices to ensure data protection regulations. All Aether-based solutions offer intuitive dashboards, detailed reporting and audits. Administrators can also use role-based management to create different authorization levels and policies for groups or devices from one centralized web console.
  • 35
    Powertech Encryption for IBM i Reviews
    Powertech Encryption IBM i protects sensitive data with strong encryption, tokenization and integrated key management. Powertech Encryption allows organizations quickly and efficiently to encrypt data fields, backups, and IFS files using its intuitive screens and proven technology. With its intuitive screens, proven technology, and database encryption software, organizations can quickly and efficiently encrypt data fields, backups, IFS files, and other files. Powertech Encryption is trusted by organizations around the globe to protect confidential data on IBM i (iSeries and AS/400) as well as data from distributed system from both internal and external hackers.
  • 36
    SAV7 Reviews
    SAV7 encrypts any file type with AES 256 and generates an encrypted key to restore files. The key file is required to restore encrypted files. The key file is required to decrypt files. SAV7 AES 256 Encryption uses the latest encryption technology based upon AES (Advanced Encryption Standard). This technology provides reliable security for your data by combining symmetric encryption, message authentication codes (MACs), and authentication. The AES algorithm is one of the most popular encryption algorithms in the world. It is used by governments, banks and other organizations around the globe. SAV7 protects your sensitive data from unauthorized access using a robust encryption and authentication method that adheres to current security standards.
  • 37
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4 (or simply CE 4) is a powerful, yet simple-to-use freeware file encryption utility. It can be used to quickly encrypt files and folders and protect your confidential and important data. Encryption refers to the process of encoding information so it cannot be accessed by others without the secret key. While encryption is used to protect sensitive documents and information, encryption can also be used to prevent people from viewing your personal data. It is possible to send important files over the internet after encrypting them. This eliminates the possibility of the contents being seen by anyone other than the recipient, even bypassing attacks such as Network Sniffing.
  • 38
    ZevaCrypt Reviews

    ZevaCrypt

    ZevaCrypt

    $9.90 per month
    Increase the return on investment for existing PIV infrastructure to enable cross-agency encryption with ZevaCrypt™, an intuitive and true end–to-end encryption solution. Secure email communication has been a problem that has been difficult to solve, especially for those who struggle to enforce high assurance credentials like PIV or CAC. Email is still our primary method of communication for sensitive and non-sensitive information. Although encryption within an organization is easy, it can be difficult and sometimes manual to encrypt email across organizational boundaries. Existing PKI encryption systems do not provide the required level of protection. Additionally, currently no encryption system validates certificate policies in the way they were intended. Strong encryption must combine strong identity and strong cryptography. This intersection of goals can only be achieved using PKI encryption.
  • 39
    OpenText ZENworks Full Disk Encryption Reviews
    OpenText ZENworks full disk encryption allows you to centrally enforce policies that encrypt entire hard drives on Windows 7, Windows 8 and Windows 10 machines within your organization. You can manage them with the same web-based interface and adaptive agent you use for other ZENworks Products. Encrypting your entire hard drive is a proven way to protect company data. Ensure that devices encrypted across the enterprise are easy to manage. You can remotely unlock devices protected by full disk-encryption and keep users productive when they work remotely. You must comply with government regulations and industry guidelines to protect patient and customer data. Use your experience with ZENworks in order to reduce the costs of implementing Full Disk Encryption.
  • 40
    Ubiq Reviews

    Ubiq

    Ubiq Security

    $0.001 per encrypt
    Encrypt your sensitive data before leaving the application so that the storage layer and adversaries only see ciphertext. Client-side encryption that is native to the application protects data against sophisticated attackers, supply chain attacks, and internal threats. Most at-rest encryption solutions - transparent disk encryption, full disk encryption, etc. They are ineffective for modern threats, because they give admins, key processes and attackers implicit access to plaintext. Ubiq’s developer-first encryption-as code platform eliminates this gap and bridges the divide between engineering and security teams. Lightweight, prepackaged encryption libraries and code that can be easily integrated into any application for native client-side cryptography and set-and forget key management.
  • 41
    Concealer Reviews

    Concealer

    BeLight Software

    $19.99 one-time payment
    This Mac encryption software is reliable and secure. It stores data in the form of cards, and uses industry-standard data encryption methods (AES-256) to protect credit card numbers, website passwords and software license codes. It also protects confidential files and photos. This password manager includes card templates that make it easy to store credit card details, passwords, login information, serial numbers, and other information. Simply select a category and then copy your data into it. This encrypted data will not be accessible to anyone without your master password. Our encryption software hides your files and protects them with AES256 encryption. To double your protection, you can either use the master password only or create a separate password for each vault. Drag and drop files from the Finder to add them. It's simple and effective.
  • 42
    Randtronics DPM easyCipher Reviews
    Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database.
  • 43
    PureEncrypt Reviews
    Anyone who doesn't know the password will have no idea what your files are. Store your files on a secure cloud or lock them up on your computer. Cloud storage with encryption is available to protect documents, photos, videos, and more. Encrypt all your files, videos, photos and more. If you want to share encrypted files or folders, you can export them in complete privacy. PureEncrypt allows you to encrypt files and then save them in your cloud storage. Store files securely and conveniently in a location you can easily access. Passports, private documents and more can be locked behind password-protected vaults. Create and protect unlimited secure vaults to keep your files safe. You can sync your vaults with password protection from anywhere. You can be confident that your privacy is protected while you log in to up to 10 computers.
  • 44
    Xecrets Ez Reviews

    Xecrets Ez

    Axantum Software AB

    €15/year
    Xecrets Ez is a simple desktop application that allows you to encrypt files on Windows, Mac or Linux. It is compatible with AxCrypt and uses the same code. However, it is less complex, and focuses on delivering only the core functionality without any bells and whistles. It's a great option for personal daily use at a much lower cost than AxCrypt. Xecrets Ez is not dependent on Internet, administrative privileges, or installation. It allows you to encrypt and decrypt files and open them for editing with just a few clicks or drag-and-drop. It is a frontend for Xecrets Cli which is an open-source and free command-line program that handles encryption, decryption, and secure wiping. The command line is also available for download and can be used separately to script and integrate into other software.
  • 45
    Roseman Labs Reviews
    Roseman Labs allows you to encrypt and link multiple data sets, while protecting the privacy and commercial sensitivity. This allows you combine data sets from multiple parties, analyze them and get the insights that you need to optimize processes. Unlock the potential of your data. Roseman Labs puts the power of encryption at your fingertips with Python's simplicity. Encrypting sensitive information allows you to analyze the data while protecting privacy, commercial sensitivity and adhering GDPR regulations. With enhanced GDPR compliance, you can generate insights from sensitive commercial or personal information. Secure data privacy using the latest encryption. Roseman Labs lets you link data sets from different parties. By analyzing the combined information, you can discover which records are present in multiple data sets. This allows for new patterns to emerge.
  • 46
    Encrypto Reviews
    Encrypto adds AES256 encryption to any file or folder. Encryption ensures that your file is secure and can only be accessed by the right person. Instead of giving a password to the recipient and a code, send a unique embedded password hint that only they can decipher. You can send encrypted files via email, Messages and AirDrop, Dropbox, AirDrop, AirDrop, AirDrop, AirDrop, or USB stick. No matter how you send them, your files will be protected. Encrypto allows you to encrypt and share files. You can also save them on your own disk. You can select your files and run Encrypto to protect them. A data encryption strategy is essential if you haven’t been living on Mars for the last few years. Encrypto can be part of your data encryption strategy. It's simple to use and virtually impossible to hack. Give it a try right now.
  • 47
    JM-Crypt Reviews

    JM-Crypt

    JM-Crypt

    $2.99 (Android) - $9.99 (PC)
    Multi-platform, low-cost and professional software (Windows PC - Android Mobile) that encrypts sensitive data like photos and documents to protect them against theft or ransom. Ideal for VIPs and liberal professions like lawyers, doctors, etc. Check out our detailed product sheets on MS Store – "JM-Crypt PC" and Play Store – "JM-Crypt Mobile". Our software install on your device locally. No remote servers, no third parties, no pub, no IT backdoor and this for a derisory cost and unlimited duration. JM-Crypt uses the best known certified and official algorythm : AES-256 – CBC – PKCS with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. The PC version allows serial encrytion, much better than full disk encryption as this method doesn't slow down your computer's performance, "JM-Crypt PC" can handle for fast encryption any folder or file extention of your choice.
  • 48
    IBM Guardium Data Encryption Reviews
    This suite of integrated encryption tools will help you protect your database and file data from misuse, and comply with government and industry regulations. IBM Guardium Data Encryption is an integrated suite of products based on a common architecture. These highly-scalable products provide encryption, tokenization and data masking capabilities, as well as key management, to help protect and manage access to databases, containers and files across the hybrid multicloud, securing assets in cloud, virtual, Big Data and on-premise environments. By encrypting database and file data using features such as data masking, tokenization and key rotation, organizations can ensure compliance with industry and government regulations, such as GDPR, CCPA and PCI DSS. Guardium Data Encryption features, such as data access audit logging and tokenization, data masking, and key management, help organizations meet regulations like HIPAA, CCPA, or GDPR.
  • 49
    Polar Crypto Component Reviews

    Polar Crypto Component

    Polar Software

    $239.00/one-time/user
    Polar Crypto Component provides unbreakable encryption functionality to your Windows applications. It allows you to create your own security systems immediately or to integrate it into existing systems, increasing their security and performance. Polar Crypto uses the most recent encryption technology and includes full source code written using MS Visual C++. Polar Crypto is an ActiveX component and DLL component that can be used whenever secure information, authenticity, and data integrity are required. Absolute confidentiality is required in all business transaction applications. Digital signature creation and validation Applications used in e-commerce websites to store sensitive information, such as credit card details of clients. Desktop applications that encrypt confidential files on your PC or computer network.
  • 50
    Atakama Reviews
    Unique information security solution that protects business data from hackers, even when other security measures fail. Atakama can customize security policies to meet your business's needs and user workflows. Protecting confidential data from both internal and external threats is a top priority. Atakama allows you to protect sensitive information such PII, HR records and M&A deal documents. It also protects earnings reports, PII, PII, PII, financial and technical data, internal memos, investment models, and many other data. Individual file-level encryption is becoming more important. Federal and state cybersecurity regulations are becoming more complex and more stringent. Ransomware attacks that result in file theft and publication can cause havoc within any organization. Atakama files are always encrypted client-side, so the encrypted version of the file is always available in the cloud or on a server.