+
+

Related Products

  • QuantaStor
    6 Ratings
    Visit Website
  • Satori
    77 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • IBM Security MaaS360
    585 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    1,747 Ratings
    Visit Website
  • NinjaOne
    1,576 Ratings
    Visit Website
  • Venn
    27 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • ExpressVPN
    395 Ratings
    Visit Website
  • Keeper Security
    1,475 Ratings
    Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Audience

Individuals seeking an encryption tool to encrypt and hide files

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$39.95 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Company Information

East-Tec
Founded: 1997
Romania
www.east-tec.com/invisiblesecrets/

Alternatives

Alternatives

Folder Lock

Folder Lock

NewSoftwares.net
Cypherix Secure IT

Cypherix Secure IT

Cypherix Software
Cryptainer Pro

Cryptainer Pro

Cypherix Software
PureEncrypt

PureEncrypt

PureVPN

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Securonix Security Operations and Analytics
Thunder TPS
Trustwave DbProtect

Integrations

Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Securonix Security Operations and Analytics
Thunder TPS
Trustwave DbProtect
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim east-tec InvisibleSecrets and update features and information
Claim east-tec InvisibleSecrets and update features and information