Cryptomator

Cryptomator

Skymatic GmbH
+
+

Related Products

  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • Files.com
    316 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • MOVEit
    622 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website

About

Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Users and companies looking for a software solution to protect their cloud data through encryption processes

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Skymatic GmbH
Founded: 2016
Germany
cryptomator.org

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

Alternatives

Cryptainer Pro

Cryptainer Pro

Cypherix Software

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

AeroFTP
Amazon S3
Atlantic.Net
BIMA
Comarch Business Intelligence
Comarch EDI
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Cyberduck
Dropbox
Google Drive
Logsign
MaxPatrol
Microsoft OneDrive
Mountain Duck
SIRP
Trustwave DbProtect
leitzcloud by vBoxx

Integrations

AeroFTP
Amazon S3
Atlantic.Net
BIMA
Comarch Business Intelligence
Comarch EDI
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Cyberduck
Dropbox
Google Drive
Logsign
MaxPatrol
Microsoft OneDrive
Mountain Duck
SIRP
Trustwave DbProtect
leitzcloud by vBoxx
Claim Cryptomator and update features and information
Claim Cryptomator and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information