+
+

Related Products

  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • MOVEit
    617 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • Files.com
    306 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.

About

Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Exposed people or professions like VIP's, Lawyers, medical professions etc.

Audience

IT teams searching for an advanced data encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$2.99 (Android) - $9.99 (PC)
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

JM-Crypt
Founded: 2017
Belgium
www.jmcryptsecurity.com

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/

Alternatives

Alternatives

CylanceENDPOINT

CylanceENDPOINT

BlackBerry
Xecrets Ez

Xecrets Ez

Axantum Software AB
BestCrypt

BestCrypt

Jetico
Panda Full Encryption

Panda Full Encryption

WatchGuard Technologies

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

AD Enterprise
AirShield
Cyware
Delta Lake
Entrust Certificate Hub
Entrust Identity Enterprise
GoSecure
Intellego XT
Recorded Future
SOCRadar Extended Threat Intelligence
Tenable One
The Respond Analyst
ThreatQ
Trellix Detection as a Service
Trellix Endpoint Security (HX)
Trellix Security Platform
Trellix XDR
Trustwave DbProtect
iSecurity AP-Journal
iSecurity Audit

Integrations

AD Enterprise
AirShield
Cyware
Delta Lake
Entrust Certificate Hub
Entrust Identity Enterprise
GoSecure
Intellego XT
Recorded Future
SOCRadar Extended Threat Intelligence
Tenable One
The Respond Analyst
ThreatQ
Trellix Detection as a Service
Trellix Endpoint Security (HX)
Trellix Security Platform
Trellix XDR
Trustwave DbProtect
iSecurity AP-Journal
iSecurity Audit
Claim JM-Crypt and update features and information
Claim JM-Crypt and update features and information
Claim Trellix Data Encryption and update features and information
Claim Trellix Data Encryption and update features and information