SSProtect

SSProtect

Definitive Data Security
SecureZIP

SecureZIP

PKWARE
+
+

Related Products

  • Cloudflare
    1,948 Ratings
    Visit Website
  • Adversus
    170 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Proton VPN
    41,009 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Keeper Security
    1,752 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Control D
    182 Ratings
    Visit Website
  • ManageEngine OpManager
    1,635 Ratings
    Visit Website

About

The :Foundation Client is very small and uses minimal system resources, operating in the background and in response to user-driven activities. Access the UI to enumerate managed resources, view reports, or as an Administrator, deploy and manage Users, Service Components, and Organization resources. The :Foundation Client coordinates user-driven activity, dispatching secure requests to KODiAC Cloud Services while handling end-user application workflow integration. Decryption, re-encryption, authentication – never concern yourself with manual activities, the :foundation Client makes encryption both practical and easy. Access the list of managed items, viewing enumerated Version Instances and/ or your Managed Data Archive. Restore content, acquire and review Usage Reports, and even protect large data sets – all from the same set of User Interface controls available to every User independent from the Role they play in an organization.

About

Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage and improve their operations

Audience

Encryption solution for developers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Definitive Data Security
definisec.io/ssprotect-deployment/

Company Information

PKWARE
Founded: 1986
United States
www.pkware.com

Alternatives

Infiltrator

Infiltrator

Infiltration Systems

Alternatives

StealthDisk Mobile

StealthDisk Mobile

Security Group Six
Ridgeback

Ridgeback

Ridgeback Network Defense
StealthDisk Mobile

StealthDisk Mobile

Security Group Six

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

No info available.

Integrations

No info available.
Claim SSProtect and update features and information
Claim SSProtect and update features and information
Claim SecureZIP and update features and information
Claim SecureZIP and update features and information