Cypherix Secure IT

Cypherix Secure IT

Cypherix Software
+
+

Related Products

  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • Files.com
    330 Ratings
    Visit Website
  • MOVEit
    622 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,305 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,936 Ratings
    Visit Website
  • NordVPN
    1,724 Ratings
    Visit Website

About

Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Government, Education, Healthcare, Legal, Corporate, Enterprise, Account Companies

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

$29.95
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 1.0 / 5
ease 3.0 / 5
features 3.0 / 5
design 3.0 / 5
support 1.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cypherix Software
Founded: 1998
United States
www.cypherix.com

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

Alternatives

Cryptainer Pro

Cryptainer Pro

Cypherix Software
Encrypto

Encrypto

MacPaw

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect
Claim Cypherix Secure IT and update features and information
Claim Cypherix Secure IT and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information