Compare the Top Encryption Software in Germany as of August 2024 - Page 2

  • 1
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 2
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.
  • 3
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
  • 4
    east-tec SafeBit
    east-tec SafeBit is a disk encryption software and the perfect solution for protecting your data against potential unauthorized access and information leaks. It features on-the-fly disk encryption, by creating virtual disk drives, where you can [hide files & folders](/safebit/hide-folders/), keep them encrypted all the time, but still work with these files just like you work with normal files. east-tec SafeBit is a disk encryption software that helps you protect your confidential information from unauthorized access, data breaches, or computer theft. It is the perfect add-on to computer privacy software by allowing you to install and execute programs inside encrypted vaults, therefore leave all your traces encrypted inside the safe. Encrypt folders and files on-the-fly with east-tec SafeBit. On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention.
    Starting Price: $29.95 one-time payment
  • 5
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 6
    Cryptshare

    Cryptshare

    Cryptshare

    Cryptshare is innovation to protect your information when most at risk. We all need to send messages and data in our daily business. However, we face many limitations, as soon as data is in transit: 1. Protection of data 2. File size limitations Our solution solves these in a very effective and user-friendly way. It brings many other benefits including: *Detailed audit trail *Compliance with central data protection regulations *Great potential for automating business communication *It is also inexpensive, easy to implement, and accessible from any kind of device with a browser. Cryptshare complies with ISO 27001 and GDPR. Cryptshare keeps your information secure all the way.
    Starting Price: €5 per user per month
  • 7
    Salesforce Shield

    Salesforce Shield

    Salesforce

    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 8
    PureEncrypt

    PureEncrypt

    PureVPN

    Your files will be a complete mystery to anyone who doesn’t have the password. Keep your files in secure cloud storage or lock them away on your personal computer. Get cloud storage with built-in encryption so you can protect your documents, photos, and more. Make all your photos, videos, and files private with total encryption. Export encrypted files and folders with complete privacy if you choose to share them with others. You can encrypt your files with PureEncrypt, and save the new files in your cloud storage. Combine security and convenience so you can store files in a place you can always reach. Lock your passports, private documents, and more behind password-protected vaults. Create and organize unlimited secure vaults and protect them so your files stay secure. Sync your password-protected vaults from anywhere so you can stay secure. Be confident in your privacy while you stay logged in on up to 10 computers.
    Starting Price: $3.99 per month
  • 9
    Vaporstream

    Vaporstream

    Vaporstream

    Vaporstream is how you have leakproof conversations, send disappearing messages, and stay in control of your information, all while remaining compliant. You should always have complete control over who can see your sensitive business information, when it can be forwarded, copied, shared, or saved, across your enterprise, and even after it reaches recipients’ devices. Get the convenience of traditional mobile apps with the functionality, reliability, and privacy your business demands. Our advanced content controls and enterprise-level security enable private and disappearing business communications while maintaining compliance with organizational and regulatory requirements. Send disappearing messages while maintaining compliance. You store your records and integrate them with your workflows. Communicate securely with external users. Mobile application with a desktop client. Shred conversations, not just messages.
    Starting Price: Free
  • 10
    Evervault

    Evervault

    Evervault

    Go from zero to audit-ready in less than a day using Evervault to encrypt cardholder data. Evervault works with all typical cardholder data flows, so you can compliantly collect PCI data for processing, issuing or storage. In most cases, we’ll reduce your PCI scope to the SAQ A control set — the smallest set of PCI DSS controls. We’ll work with you to understand your architecture and provide recommendations on how to integrate Evervault to reduce your compliance scope as much as possible. You’ll integrate Evervault based on one of our architecture templates and we’ll validate your integration to ensure it’s fully compliant. We’ll give you an audit-ready PCI DSS policies and procedures bundle, as well as our PCI DSS Attestation of Compliance (AoC). We’ll also introduce you to an auditor who’s familiar with Evervault’s architecture.
    Starting Price: $395 per month
  • 11
    MOVEit

    MOVEit

    Progress

    MOVEit Managed File Transfer (MFT) software is used by thousands of organizations around the world to provide complete visibility and control over file transfer activities. Assure the reliability of core business processes and the secure and compliant transfer of sensitive data between partners, customers, users and systems with MOVEit. MOVEit's flexible architecture allows you to choose the exact capabilities to match your organizations specific needs. MOVEit Transfer enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It provides the security, centralized access controls, file encryption and activity tracking needed to ensure operational reliability and compliance with SLA, internal governance and regulatory requirements. MOVEit Automation works with MOVEit Transfer or FTP systems to provide advanced workflow automation capabilities without the need for scripting.
  • 12
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a revolutionary steganography and file encryption software that allows you to not only encrypt file and folder structures that contain confidential data but it also offers you the possibility to hide files, making it completely invisible to any user. Encrypt file contents and hide files using east-tec InvisibleSecrets, a complete privacy and cryptography software solution. Other useful features (password manager, file shredder, program lock) will be described below. east-tec InvisibleSecrets is a file encryption software that helps you protect your confidential information from prying eyes or unwanted access by helping you encrypt file or folder structures on your computer. Featuring strong file encryption algorithms, it ensures you the maximum security level you need for complete privacy protection. Securely hide files and your sensitive information.
    Starting Price: $39.95 one-time payment
  • 13
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 14
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    If you store and transmit sensitive data through automated business processes, trust E-Business Server to give you the industry-leading encryption and security tools you need. There’s no need to replace E-Business Server. E-Business Server is an excellent and affordable option for small and large businesses alike, but this encryption solution is perfect for Fortune 1,000 corporations, other large enterprises and government agencies that require large-scale data-protection on a variety of platforms, from z/OS mainframe to Distributed platforms (ie. Windows®, Linux, AIX, Solaris). Utilizing versatile APIs and PGP encryption, which protects encrypted data at rest and in motion, E-Business Server offers strong encryption that integrates with the widest range of applications and platforms.
  • 15
    NetLib Encryptionizer

    NetLib Encryptionizer

    NetLib Security

    Transparent Data Encryption (TDE) for all Editions of SQL Server from Express to Enterprise. No programming required. Developer and OEM friendly: may be easily bundled with SQL Server based applications. Cost effective alternative to upgrading to SQL Server Enterprise. Assists with compliance with various regulations. Protects data and intellectual property.
  • 16
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
  • 17
    HashiCorp Vault

    HashiCorp Vault

    HashiCorp

    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 18
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • 19
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 20
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 21
    Smartcrypt

    Smartcrypt

    PKWARE

    Companies that use PKWARE’s Smartcrypt to protect data within the organization can also use Smartcrypt to share encrypted files with individuals and groups outside the company. The free Smartcrypt Reader is available for download by anyone, and can be used to decrypt and open files that have been secured using Smartcrypt. Smartcrypt Reader is available for Windows and Mac platforms. Unlike other approaches that require senders to share encryption passphrases with recipients or deal with complex PKI workflows, the Smartcrypt Reader can automatically retrieve encryption keys for authorized users—even external users—eliminating one of the biggest security challenges in external data exchange. When a Smartcrypt user needs to share sensitive data with someone outside the company, the Smartcrypt user creates (or selects) a Smartkey that is associated with the recipient’s email address. Files can then be encrypted using that Smartkey and shared via email, cloud storage, or any other medium.
  • 22
    IBM Security Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 23
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock devices that are protected by full disk encryption and keep users productive while they work remotely. Ensure that you meet critical industry guidelines and government regulations for protecting customer and patient data. Leverage your experience with ZENworks to reduce the cost of implementing Full Disk Encryption.
  • 24
    Enveil

    Enveil

    Enveil

    Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization.
  • 25
    Conjurers Encrypter
    Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing.
  • 26
    Ziroh Store

    Ziroh Store

    Ziroh Store

    It’s unsafe to store/sync your critical files to cloud storage platforms. Because there is no cloud that is able to keep your details completely private to you. All your files on the cloud are telling tales about you to your cloud storage provider, your personal images, academic transcripts, bank details, and work documents. You really don’t have a say in who reads your information, and what they do with it. When you sync your gallery to your cloud, it exposes the personal photos and videos on your device to all third parties who have a backdoor to your cloud storage. They are privy to every private moment you capture and even delete. Do a simple search to check when your cloud storage provider was last hacked. Your files on the cloud are private to you, your cloud storage provider and their allies only until a savvy hacker looks your way. Ziroh Store is a privacy-preserving intuitive software that helps you to upload your files end-to-end encrypted to any of your cloud platforms.
  • 27
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • 28
    Gilisoft #1 All-in-One Toolkit Suite
    22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. In conclusion, you can do almost multimedia work with audio and video tools, and you can do encryption operation with encryption software. Just free download and experience it now!
    Starting Price: $149.99
  • 29
    Ubiq

    Ubiq

    Ubiq Security

    Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.
    Starting Price: $0.001 per encrypt
  • 30
    Cryptainer Pro

    Cryptainer Pro

    Cypherix Software

    Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro allows you to encrypt any file or folder on any Windows PC. Password protect any file or folder with strong Encryption. Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords. A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords for each encrypted file. Just Drag and Drop to hide any data of any kind (documents, pictures, entire folders or even run programs) in a safe password protected vault. Cryptainer's ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. Simple, Secure, Easy-to-Use. Save Encrypted Vaults to Cloud Storage Providers. Runs on all versions of Windows. A must have for every desktop.
    Starting Price: $69.95