Audience

Organizations in need of an assured Endpoint Security system

About Becrypt

For endpoint devices you can't afford to have compromised. High Assurance products and services for organizations that face elevated threat. High assurance solutions for desktops, laptops and thin clients. Architectures based on government-backed research and development. From managed services and security monitoring to specialist R&D. Zero trust architectures provide enhanced protection for cloud and online services, combining device health and identity measurements fo service access. Allowing access to corporate services from unmanaged endpoints remains a frequent source of supply chain vulnerabilities. Robust device health and identity management can transform 3rd party IT risks. Proven cloud and mobile architectures delivered through managed service to simplify secure 3rd party collaboration.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Becrypt
Founded: 2001
United Kingdom
www.becrypt.com/uk/

Videos and Screen Captures

Becrypt Screenshot 1
Other Useful Business Software
Secure File Transfer for Windows with Cerberus by Redwood Icon
Secure File Transfer for Windows with Cerberus by Redwood

Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Try for Free

Product Details

Platforms Supported
Cloud
Training
Webinars
Support
Phone Support
Online

Becrypt Frequently Asked Questions

Q: What kinds of users and organization types does Becrypt work with?
Q: What languages does Becrypt support in their product?
Q: What kind of support options does Becrypt offer?
Q: What type of training does Becrypt provide?

Becrypt Product Features

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption