Alternatives to FileMarket

Compare FileMarket alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FileMarket in 2026. Compare features, ratings, user reviews, pricing, and more from FileMarket competitors and alternatives in order to make an informed decision for your business.

  • 1
    Bright Data

    Bright Data

    Bright Data

    Bright Data is the world's #1 web data, proxies, & data scraping solutions platform. Fortune 500 companies, academic institutions and small businesses all rely on Bright Data's products, network and solutions to retrieve crucial public web data in the most efficient, reliable and flexible manner, so they can research, monitor, analyze data and make better informed decisions. Bright Data is used worldwide by 20,000+ customers in nearly every industry. Its products range from no-code data solutions utilized by business owners, to a robust proxy and scraping infrastructure used by developers and IT professionals. Bright Data products stand out because they provide a cost-effective way to perform fast and stable public web data collection at scale, effortless conversion of unstructured data into structured data and superior customer experience, while being fully transparent and compliant.
    Compare vs. FileMarket View Software
    Visit Website
  • 2
    Kled

    Kled

    Kled

    Kled is a secure, crypto-powered AI data marketplace that connects content rights holders with AI developers by providing high‑quality, ethically sourced datasets, spanning video, audio, music, text, transcripts, and behavioral data, for training generative AI models. It handles end-to-end licensing: it curates, labels, and rates datasets for accuracy and bias, manages contracts and payments securely, and offers custom dataset creation and discovery via a marketplace. Rights holders can upload original content, choose licensing terms, and earn KLED tokens, while developers gain access to premium data for responsible AI model training. Kled also supplies monitoring and recognition tools to ensure authorized usage and to detect misuse. Built for transparency and compliance, the system bridges IP owners and AI builders through a powerful yet user-friendly interface.
  • 3
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 4
    Secure My Files
    Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script into the page. You can encrypt or decrypt a file, providing a password. Source code is available on Github for everyone to inspect. Anyone can detect issues and contribute, improving security. We and our servers are based in Europe. Build and host your own flavor of Secure My Files. Reuse as a library in your own application.
    Starting Price: $14.99 one-time payment
  • 5
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 6
    Space

    Space

    Space

    What you store on Space is not siloed in our platform. You own and control your space, and can access it via other interfaces if you wish. All files, transfers, and interactions in Space are end-to-end-encrypted, and only users have control of the decryption keys. Anyone can review our code and verify our privacy and security claims, and developers can openly build on top of our Open Web stack. Store files online in a Space only you can control and access. The keys to your files and account are in your hands only, not ours, and all files are automatically backed to Filecoin, as a decentralized layer. All accounts in Space are tied to an Ethereum key-pair only you own and have access to. You can choose to log in with Twitter, Gmail, or email protected by the Torus network, or using high-privacy alternatives like MetaMask and other crypto wallets. Share with convenient options (email, social handles, ENS, etc.) or privacy-first ones (crypto addresses, links).
    Starting Price: $11 per month
  • 7
     dbForge SQL Decryptor
    dbForge SQL Decryptor is a highly functional free tool designed for decrypting database objects that were created with the WITH ENCRYPTION option. Key Features: - Connecting to multiple servers, both local and remote - Decryption of all types of objects, including stored procedures, functions, triggers, and views - Batch decryption wizard for bulk operations - Saving decrypted objects to a single T-SQL file or separate T-SQL files for each object - Decrypting objects directly on the server for further work in SSMS - Restoration of original T-SQL descriptions even if the original source file is unavailable - Support for all national characters - Search for encrypted objects and filtering them by object types - Syntax highlighting for both code and comments - No DAC (Dedicated Administrator Connection) mode required - No need for manual T-SQL coding dbForge SQL Decryptor, with its light and easy-to-operate user interface, is an essential tool for
  • 8
    Magnum Wallet

    Magnum Wallet

    Magnum Wallet

    It is essential that you want to know more about our wallet. Here we will provide you with the most vital information about Magnum. Magnum is a light wallet, hence we do not receive and store users’ private keys, backup files or personal information. A light wallet is the most reliable and safe way to operate coins and tokens. Users have full control over their private keys during the whole session. The private keys never leave your device. They are encrypted and stored in the browser’s local storage. All transactions with blockchain are controlled by an encrypted SSL connection. Magnum operates with a backup file that contains the encrypted private keys. It is necessary to download a backup and keep it in a safe place. You can use the backup to get access to all your wallets via different devices or browsers. Users must enter the passphrase to decrypt the backup. We cannot recover your backup file or private key if you lose or forget the passphrase.
  • 9
    Filet

    Filet

    Filet.finance

    Filet is a Filecoin mining power tokenization protocol deployed on Filecoin, BSC, and Mixin networks. It tokenizes Filecoin mining power and introduces it into the DeFi ecosystem to provide FIL holders with high-growth FIL staking services, and the annualized FIL return is about 24%. The mining power and assets are completely open and transparent. Filet is backed by one of the largest mining dealers in North America. Filet is one of the Filecoin ecosystem projects. The program is open source and audited by Certik. Currently, over 370K FIL staked on Filet to join Filecoin mining.
  • 10
    ScalePost

    ScalePost

    ScalePost

    ScalePost provides a secure platform for AI companies and publishers to connect, enabling data access, content monetization, and analytics-driven insights. For publishers, ScalePost turns content access into revenue, offering secure AI monetization and full control. Publishers can control who accesses their content, block unauthorized bots, and whitelist verified AI agents. The platform prioritizes data privacy and security, ensuring that content is protected. It offers personalized guidance and market analysis on AI content licensing revenue, along with detailed insights on how content is being used. Integration is seamless, allowing publishers to open up their content for monetization in just 15 minutes. For AI/LLM companies, ScalePost provides verified, high-quality content tailored to specific needs. Users can quickly connect with verified publishers, saving valuable time and resources. The platform allows granular control, enabling access to content specific to users' needs.
  • 11
    KodeFile

    KodeFile

    1SQ Technologies

    The hardest part of encryption is dealing with the encryption keys. Until now! KodeFile's Key On Demand Encryption (KODE) generates and stores a unique key for every file you encrypt. Then on demand, shares the secret keys with your Confidants so that they can decrypt. KodeFile never possesses your files. You separately store and share the files as you see fit (email, cloud, flash drive, etc.), ensuring you are always in control of your privacy. KodeFile generates and stores a unique key for every file you encrypt. Shares any key on demand. The keys are secret to everyone, ensuring they are never exposed and shared with unauthorized parties.
  • 12
    TollBit

    TollBit

    TollBit

    TollBit helps you monitor AI traffic, manage licensing deals & monetize your content in the AI era. See which user agents are accessing content that is disallowed. TollBit also maintains up to date lists of user agents and IP addresses we discover associated with AI apps across our network. Our easy to use UI makes it easy to drill down and conduct your own analyses. Enter in your own user agents and see the top pages accessed and how AI traffic evolves over time. TollBit supports historic log ingestion. This allows your team to analyze trends in AI traffic to your content in an easy UI without maintaining cloud infrastructure yourself. (Not available in free tier.) Tap into the growing AI market with ease. Our platform simplifies licensing, empowering you to monetize your content within the dynamic world of AI development. Set your terms upfront, and we'll connect you with AI innovators ready to pay for your work.
  • 13
    Created by Humans

    Created by Humans

    Created by Humans

    Take control of your works' AI rights and get compensated for their use by AI companies. You're in control of if and how your work is used by AI partners. We negotiate the details of the license, and you track payments in your dashboard. Get compensated when your work is licensed. Easily opt-in (or out) of licensing options. You decide what you're comfortable licensing, and we do the rest. Access curated, unique content and build with the full permission of rights holders. We're on a mission to preserve human creativity and make it thrive in the AI era. We believe that to get the best out of technology, we must ensure we continue receiving the best human-created works. We celebrate and nurture the unique talents and expressions that make us human. We believe that bringing together divided groups can drive an outsized positive impact on the world. We prioritize building long-term, genuine connections over short-term gains.
  • 14
    FormatPDF

    FormatPDF

    FormatPDF

    FormatPDF is a website that provides a variety of online tools for working with PDF documents. These tools include PDF conversion, merging and splitting, compression, encryption and decryption, as well as editing and annotating PDF files. With FormatPDF, users can easily convert a wide range of document formats to PDF, including Word, Excel, PowerPoint, and image files. The website also allows users to merge multiple PDF files into a single document, or to split a large PDF into smaller ones. In addition to conversion and manipulation tools, FormatPDF.com offers features for improving the quality and security of PDF documents. The website includes tools for compressing PDF files, which can reduce the size of large documents for easier sharing and storage. Users can also encrypt PDF files with passwords to restrict access, or decrypt protected files if they have the necessary credentials.
    Starting Price: $4.90/month
  • 15
    Lockystar

    Lockystar

    Lockystar

    Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.
  • 16
    Filecoin

    Filecoin

    Filecoin

    The Filecoin mainnet is here. Join today to make deals, store data, and earn FIL. The Filecoin network achieves staggering economies of scale by allowing anyone to participate as a storage provider and monetize their open hard drive space. The Filecoin network is designed to reward participants at multiple levels — from large scale data centers to local entrepreneurs with mining rigs that cover the last mile. Miners combine disks and other hardware to win storage deals, store data, and earn filecoin. Mining configurations range from desktop computers to large racks with disks and compute. No useless proof-of-work here. Storing more files is directly related to winning more block rewards. The more storage you add, the more filecoin you’ll earn. With the Filecoin retrieval market, miners will be rewarded for delivering content quickly.
  • 17
    Defined.ai

    Defined.ai

    Defined.ai

    Defined.ai provides high-quality training data, tools, and models to AI professionals to power their AI projects. With resources in speech, NLP, translation, and computer vision, AI professionals can look to Defined.ai as a resource to get complex AI and machine learning projects to market quickly and efficiently. We host the leading AI marketplace, where data scientists, machine learning engineers, academics, and others can buy and sell off-the-shelf datasets, tools, and models. We also provide customizable workflows with tailor-made solutions to improve any AI project. Quality is at the core of everything we do, and we are in compliance with industry privacy standards and best practices. We also have a passion and mission to ensure that our data is ethically collected, transparently presented, and representative – since AI often reflects of our own human biases, it’s necessary to make efforts to prevent as much bias as possible, and our practices reflect that.
  • 18
    Datarade

    Datarade

    Datarade

    Skip months of research. Find, compare, and choose the right data for your business. Get free & unbiased advice by data experts. Get in-depth information about 2,000+ data providers curated across 210 data categories. Our experts advise and guide you through the whole sourcing process - free of charge. Find the right data that really fits with your goals, use cases, and key requirements. Briefly describe your goals, use cases, and data requirements. Receive a shortlist of suitable data providers by our experts. Compare data offerings and choose when you’re ready. We help you to identify the data providers that are really relevant to you, so you don’t waste time in unnecessary sales pitch calls. We connect you with the right point of contact, so you get a quick response. And last but not least, our platform and experts help you to keep track of your data sourcing process, so you get the best deal.
  • 19
    Human Native

    Human Native

    Human Native

    We’re bringing together rights holders and AI developers. Helping rights holders get compensation for copyrighted works. Enabling AI developers to responsibly acquire high-quality data. A comprehensive catalog of rights holders and their works. We help AI developers find the high-quality data they need. Rights holders have granular control over which individual works are open or closed to AI training. Monitoring solutions for detecting the misuse of copyrighted material. Enabling revenue for rights holders by licensing work for training with recurring subscriptions or revenue share. We help publishers get their content or data ready for AI models. We index, benchmark, and evaluate data sets to demonstrate their quality and value. Upload your catalog to the marketplace for free. Be compensated fairly for work. Opt-in and out of generative AI usages. Receive alerts for potential copyright infringement.
  • 20
    Pixta AI

    Pixta AI

    Pixta AI

    Pixta AI is a cutting‑edge, fully managed data‑annotation and dataset marketplace designed to connect data providers with companies and researchers needing high‑quality training data for AI, ML, and computer vision projects. It offers extensive coverage across modalities, visual, audio, OCR, and conversation, and provides tailored datasets in categories like face recognition, vehicle detection, human emotion, landscape, healthcare, and more. Leveraging a massive 100 million+ compliant visual data library from Pixta Stock and a team of experienced annotators, Pixta AI delivers scalable, ground‑truth annotation services (bounding boxes, landmarks, segmentation, attribute classification, OCR, etc.) that are 3–4× faster thanks to semi‑automated tools. It's a secure, compliant marketplace that facilitates on‑demand sourcing, ordering of custom datasets, and global delivery via S3, email, or API in formats like JSON, XML, CSV, and TXT, covering over 249 countries.
  • 21
    Fasoo Secure Email
    Allow users to send decrypted documents through email without having to remove the encryption before sending. This email-based DLP tool provides an exception for encrypted documents through an approval process so internal documents always remain encrypted. Once approved, documents are decrypted by the server prior to sending them. Decrypt documents automatically as users email them without requiring the sender to request approval to decrypt the document before sending it to a recipient. Maintain document security throughout your environment, since unprotected documents are not stored on the user’s PC or mailbox.
  • 22
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 23
    Perfecto Encryptor

    Perfecto Encryptor

    Black Bird Cleaner Software

    This unique program will help you to keep any of your files and folders in encrypted form. And only you will can decrypt your files. With our software your information will be completely protected from other users and you will feel yourself completely safe.
  • 24
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 25
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 26
    PDFEncrypt

    PDFEncrypt

    PDFEncrypt

    PDFEncrypt is a free, open source utility to encrypt PDF files using standard PDF encryption algorithms. When a document is encrypted, its contents become unreadable. An authorized user can decrypt the document to obtain access to the contents. If a PDF document is encrypted with a password, the user must specify the password before the document can be viewed in Adobe Reader or Adobe Acrobat. PDFEncrypt provides a means to encrypt any standard PDF document for free, without the need to purchase the Adobe Acrobat software or upload your confidential PDF files to a third-party server for encryption. The app runs directly on your Windows PC and allows you to specify a password (required to open the document) as well as many options and permissions to apply to the PDF file.
  • 27
    nft.storage

    nft.storage

    nft.storage

    nft.storage is a brand new service, built specifically for storing off-chain NFT data. Data is stored decentralized on IPFS and Filecoin, and are referenced using content-addressed IPFS URIs that can be used in your smart contract without fear of the data being referenced changing. Just upload your data and you'll receive an IPFS hash of the content (a CID) that can be used in on-chain NFT data as a pointer to the content. Filecoin provides long-term storage for the data ensuring that even if nft.storage is attacked or taken down the NFT data persists! Optionally, you can provide additional redundancy by running your own IPFS node and pinning the CIDs of content uploaded to NFT.Storage. Alternately, you can use an additional pinning service for redundancy (NFT.Storage already does this when it backs things up to Pinata). Doing this is not necessary, but might be of interest for users looking to be in full control of their data and its availability.
  • 28
    FileShot

    FileShot

    FileShot.io

    FileShot is a privacy-first file sharing platform that encrypts files in your browser before upload, ensuring complete privacy and security. We offer 15GB of free secure storage with full access to our comprehensive tools suite including file converter, compressor, PDF editor, archive builder, and encrypt/decrypt tools. Our paid tiers offer paid access to sell files, a 50% affiliate commission program with lifetime commissions, and custom link names. There are no ads anywhere, even on the free tier, and no signups required. We provide unlimited uploads and truly excel in every category with our exceptional value proposition.
  • 29
    MathWallet

    MathWallet

    Math Wallet

    MathWallet is a multi-platform (mobile/desktop/extension/hardware) universal crypto wallet that enables storage of all BTC, ETH, Polkadot, Filecoin, EOS, Solana, BinanceChain, Cosmos tokens. Math Wallet also features cross-chain token exchanges, a multi-chain DApp store. Create wallets in-app, allowing you to store, receive and transfer token easily in a 'one stop shop' experience with an up-to-date tutorial. Monitor your portfolio and track earnings from anywhere, plus earn rewards without leaving the wallet. Secure your assets with Private Keys, Mnemonic Phrases, 2-Factor Authentication, and more. Keep up-to-date on latest Math News and blockchain news, curated by our team on Twitter and Blog. Support Decentralized Applications (DApps) operating on blockchains like ETH, EOS, TRON, Cosmos, Polkadot etc. Math Wallet is a multi-platform (mobile/desktop/hardware) universal crypto wallet. Math Wallet enables storage of 50+ blockchains and 3000+ tokens.
  • 30
    NuCypher

    NuCypher

    NuCypher

    Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 31
    OX Guard

    OX Guard

    Open-Xchange

    Security and data privacy is a growing concern. Today, both business users and consumers demand more privacy, without adding complexity to their daily tasks. OX Guard was designed specifically with this in mind. This PGP based security add-on for OX App Suite, integrates seamlessly into our existing email app, letting users encrypt and decrypt emails and files easily. There is a growing demand for privacy from users, while at the same time, they are concerned about increased complexity and reduced usability. OX Guard was designed to satisfy these concerns. An easy to use wizard lets users set up OX Guard quickly, with no additional security know-how. After set up users are able to encrypt and decrypt emails and files with just one click, integrating security seamlessly into day-to-day user workflows.
  • 32
    Folder Lock

    Folder Lock

    NewSoftwares.net

    Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.
    Starting Price: $39.95/one-time/user
  • 33
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.
  • 34
    DRACOON

    DRACOON

    DRACOON

    Project managers can create data rooms independently and assign authorizations, which relieves the IT department and departments can work more effectively and efficiently. File duplicates are prevented because all employees in DRACOON data rooms have access to the latest documents at all times and can work on files together with internal and external employees. User rights and approval/file request deadlines for easy project coordination. GDPR-compliant sending of encrypted file attachments or complete emails via DRACOON for Outlook. Rely on end-to-end encryption, which also includes client-side encryption. Only it offers maximum protection for your data. With this type of encryption, not even an admin or DRACOON as the operator can decrypt your data, because the key remains with the owner at all times. Many other providers handle this differently.
  • 35
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 36
    FinalCode

    FinalCode

    Digital Arts

    It was realized with original technology and advancedness. It consists of "FinalCode Client" that encrypts and browses files, and "FinalCode Server" that manages file authority information. , which does not require server construction and operation costs, or "FinalCode Ver.6 VA" (on-premise version: VA) , which operates on our own server, Automatically encrypts files when they are created, saved, or downloaded. Even if it is encrypted, there is no need for operation training because it is as easy to use as before. In addition, users can use it regardless of security literacy because encryption is transparent to users. We provide an executable API that allows you to call the encryption/decryption functions of "FinalCode" from internal business systems such as document management systems and workflow systems.
  • 37
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 38
    Solarium

    Solarium

    Solarium

    Solarium is a fully decentralised, end-to-end encrypted, censorship-resistant instant messenger based on the Solana blockchain. Solarium is currently in alpha phase, running on the Solana devnet. All messages in Solarium are end-to-end encrypted using the XChaCha20-Poly1305 symmetric encryption algorithm, using a 256-bit content encryption key (CEK) that is shared for all messages in a given channel. The message content in Solarium is not directly signed, i.e. the data itself, once decrypted, does not contain details about the sender. Instead, the blockchain transaction that adds the message to the channel is signed by the sender.
  • 39
    east-tec SafeBit
    East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. Your data stays protected even during unexpected shutdowns or crashes. SafeBit is versatile, allowing you to create encrypted vaults on local drives, USB sticks, and other removable media, with options to open them automatically at startup. It also offers extra security features like storing passwords on a USB key, an emergency hotkey to quickly close safes, and a virtual keyboard to prevent keylogging during password entry.
    Starting Price: $29.95
  • 40
    Symantec Endpoint Encryption
    Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.
  • 41
    Wormhole

    Wormhole

    Wormhole

    Simple, private file sharing. Wormhole lets you share files with end-to-end encryption and a link that automatically expires. So you can keep what you share private and make sure your stuff doesn't stay online forever. End-to-end encryption prevents your data from falling into the wrong hands. With end-to-end encryption, data is encrypted and decrypted only at the "end points". That means that service providers in the middle don't have access to the keys, and therefore can't read your data. We built Wormhole with end-to-end encryption. Wormhole lets you share files more quickly and easily than any other file sending service. And we do it without sacrificing your privacy. When you use Wormhole, a key is generated on your device and used to encrypt your files. In transit, your data is unreadable to Wormhole and service providers like your ISP. The key never leaves your device and you're the only one who has it – unless you decide to share it.
  • 42
    RightsManager

    RightsManager

    FileOpen Systems

    FileOpen's DRM solution operates as a control layer within industry-standard formats and applications. The system includes tools to encrypt documents, client-side decryption software that runs inside the most common viewer applications, and server software that uses a published control protocol that can also be implemented in your own solution. FileOpen uses industry-standard encryption via the methods defined in the appropriate format specification. For PDF this means AES-256 for PDF (ISO 32000) 2.0 compatibility and RC4-128 for backward compatibility to earlier versions of PDF. For MSOffice files we use AES as implemented by Microsoft via the add-in API layer. Documents encrypted with FileOpen can be opened only when, where and how the publisher's PermissionServer allows. Access may be granted with any combination of permissions to print, edit, copy, annotate, sign, save changes and other controls.
    Starting Price: $3000.00/year
  • 43
    Crypho

    Crypho

    Crypho

    Crypho is a super-secure enterprise messaging app, perfect for organisations that care about data privacy and security. Employees can communicate and share files online either person-to-person or in persistent team-rooms. All messages and files are encrypted before being transferred over the network. They can only be decrypted when they reach their intended recipient. Only you hold your encryption keys. Establish an encrypted communications channel in a few minutes. No software installation is necessary. Crypho runs in normal web browsers, desktop or mobile. It works through firewalls and across different company networks. No one else has access to your encrypted voice and video calls, and your online privacy is fully protected. Our video solution is perfect for companies with high-security requirements to communicate confidential information easily.
    Starting Price: €379 per month
  • 44
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.
    Starting Price: $29.95 one-time payment
  • 45
    DataNumen SQL Recovery
    DataNumen SQL Recovery is the best SQL server recovery tool in the world. It can repair corrupt or damaged MDF database files and recover as much of your data as possible, thereby minimizing the loss in file corruption. Recover stored procedures, scalar functions, inline table-valued functions, and multistatement table-valued functions. Recover stored procedures, scalar functions, inline table-valued functions, and multistatement table-valued functions. Recover SQL database objects, including views, triggers, rules, and defaults. Recover the schema/structure and data in the tables. Recover and decrypt encrypted objects in SQL Server databases.
    Starting Price: $499.95 one-time payment
  • 46
    AnySecura

    AnySecura

    AnySecura

    AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.
    Starting Price: $216/month
  • 47
    Hornetsecurity Email Encryption
    Business emails often contain in-house, personal, or other sensitive content that could be intercepted and accessed without authorization if inadequately protected. Ensure all-around encrypted exchange of emails with Email Encryption from Hornetsecurity for reliable, secure email communication. Outgoing emails are automatically encrypted with one of the common encryption technologies (PGP, S/MIME, or TLS), depending on the set policy and availability of the corresponding certificates, without any further user intervention. If the sender’s public key is available, their emails are automatically decrypted and delivered to the recipient. Encryption of data has become a priority because of compliance requirements. In a business environment, the exchange of sensitive files and information takes place primarily via email communication. Encryption of the transmission path is essential to protect this data.
  • 48
    Ciphermail Appliance
    Email encryption with CipherMail Most emails are sent in plain text. This means that anyone who has access to the data stream can read the content of the emails. This is unacceptable for most companies, institutions and organizations and may also violate applicable law. E-mail encryption ensures security and trust in communication. CipherMail is a central mail transfer agent (MTA) that works on the “store and forward” principle. Incoming e-mails, regardless of whether they are from internal or external sources, are only saved until they have been encrypted / decrypted and can be forwarded to the recipient. This happens without changing the email client and is possible in combination with any SMTP server! E-mail encryption can be done using S / MIME, PGP or in a PDF file - in principle or triggered by a trigger in the subject line. CipherMail also includes a Data Leak Prevention (DLP) module.
    Starting Price: $670 one-time payment
  • 49
    Juniper Advanced Threat Protection
    Juniper Advanced Threat Prevention (ATP) is the threat intelligence hub for your network. It contains a litany of built-in advanced security services that use the power of AI and machine learning to detect attacks early and optimize policy enforcement networkwide. Juniper ATP runs as a cloud-enabled service on an SRX Series Firewall or as a virtual appliance deployed locally. It finds and blocks commodity and zero-day malware within files, IP traffic, and DNS requests. The service assesses risk from encrypted and decrypted network traffic and connected devices, including IoT devices, and distributes that intelligence throughout the network, drastically decreasing your attack surface and helping avoid breaches. Automatically discover and mitigate known and zero-day threats. Identify and stop threats hiding within encrypted traffic without decrypting. Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses.
  • 50
    DriveCrypt

    DriveCrypt

    Securstar

    DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.