+
+

Related Products

  • CLEAR
    1 Rating
    Visit Website
  • MOVEit
    621 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • Files.com
    309 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website

About

Inkrypt.ai is an enterprise-grade cryptographic security and key management platform designed to deliver automated encryption, post-quantum readiness, and centralized cryptographic governance for modern software systems. The platform enables organizations to integrate encryption and key management directly into applications through generated SDKs while maintaining full operational visibility and compliance readiness. Inkrypt.ai provides end-to-end encryption across the data lifecycle, including key generation, secure storage, rotation, and access control. Its hybrid cryptographic architecture aligns with NIST post-quantum cryptography guidance, allowing enterprises to prepare for future quantum threats without disrupting existing systems. The platform includes a web-based administration and analytics console, real-time telemetry pipelines, centralized audit logging, and policy-driven access controls. Automated key rotation, zero-downtime cryptographic operations, and real-time se

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise security teams responsible for encryption, key management, and compliance Developers and engineering teams integrating encryption into applications via SDKs Cloud architects and platform teams securing APIs, microservices, and SaaS platforms Organizations in regulated industries requiring auditability and cryptographic governance Enterprises modernizing cryptography for post-quantum readiness This positioning is supported by the platform’s focus on SDK-based integration, real-time telemetry, centralized governance, and post-quantum cryptography.

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

No images available

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Inkrypt AI
Founded: 2024
United States
inkrypt.ai/

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

Alternatives

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect
Claim Inkrypt AI and update features and information
Claim Inkrypt AI and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information