Alternatives to FinalCode
Compare FinalCode alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FinalCode in 2026. Compare features, ratings, user reviews, pricing, and more from FinalCode competitors and alternatives in order to make an informed decision for your business.
-
1
HSI Donesafe
Donesafe
HSI Donesafe is a no-code, cloud-based EHS software that simplifies safety, compliance, and risk management, transforming complex processes into user-friendly workflows. Trusted by industries worldwide, Donesafe allows organizations to track, manage, and report on essential EHS functions from one central platform. Our software adapts to your team’s style, enhancing everyday workflows with effortless compliance and smooth operations. Keep pace with evolving regulations and standards, from incident reporting and audits to training and risk assessments with Donesafe. Unlock peace of mind with: - Workflows that flex to meet ever-changing regulations - Instant insights, keeping you confident in real-time safety tracking - A scalable platform that grows in step with your team’s journey - Simplified compliance that makes audits and reporting a breeze Put safety at the heart of every day with HSI Donesafe; protect your team, simplify compliance, and ensure everyone goes home safe. -
2
Resolver
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.Starting Price: $10,000/year -
3
LogicGate Risk Cloud
LogicGate
LogicGate’s leading GRC process automation platform, Risk Cloud™, enables organizations to transform disorganized risk and compliance operations into agile process applications, without writing a single line of code. LogicGate believes that flexible, easy-to-use enterprise technology can change the trajectory of organizations and the lives of their employees. We are dedicated to transforming the way companies manage their governance, risk, and compliance (GRC) programs, so they can manage risk with confidence. LogicGate’s Risk Cloud platform and cloud-based applications, combined with raving fan service and expertly crafted content, enable organizations to transform disorganized risk and compliance operations into agile processes, without writing a single line of code. -
4
Onspring
Onspring GRC Software
Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.Starting Price: $20,000/year -
5
StandardFusion
StandardFusion
A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.Starting Price: $1800 per month -
6
DriveCrypt
Securstar
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.Starting Price: $59.95 -
7
dbForge SQL Decryptor
Devart
dbForge SQL Decryptor is a highly functional free tool designed for decrypting database objects that were created with the WITH ENCRYPTION option. Key Features: - Connecting to multiple servers, both local and remote - Decryption of all types of objects, including stored procedures, functions, triggers, and views - Batch decryption wizard for bulk operations - Saving decrypted objects to a single T-SQL file or separate T-SQL files for each object - Decrypting objects directly on the server for further work in SSMS - Restoration of original T-SQL descriptions even if the original source file is unavailable - Support for all national characters - Search for encrypted objects and filtering them by object types - Syntax highlighting for both code and comments - No DAC (Dedicated Administrator Connection) mode required - No need for manual T-SQL coding dbForge SQL Decryptor, with its light and easy-to-operate user interface, is an essential tool forStarting Price: $0 -
8
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database. -
9
WinGPG
Scand
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations: - Encryption/Decryption (we offer automatic zipping at encryption time, so your files are ready to be transmitted via email or any instant messenger immediately) - Signature/Verification - Key management (create, import, export, revoke) WinGPG main operational features are: - WinNT Explorer support via context menus - Global shortcuts working from the active explorer window or clipboard - Clipboard support for both texts and files - No complicated setup, you only run a batch file WinGPG is a fully functional tool, which offers the user an opportunity to manage keys and files easily. Password protected keys, default keys, and other useful tricks are available with WinGPG. -
10
Secure My Files
SecuSimple
Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script into the page. You can encrypt or decrypt a file, providing a password. Source code is available on Github for everyone to inspect. Anyone can detect issues and contribute, improving security. We and our servers are based in Europe. Build and host your own flavor of Secure My Files. Reuse as a library in your own application.Starting Price: $14.99 one-time payment -
11
DRACOON
DRACOON
Project managers can create data rooms independently and assign authorizations, which relieves the IT department and departments can work more effectively and efficiently. File duplicates are prevented because all employees in DRACOON data rooms have access to the latest documents at all times and can work on files together with internal and external employees. User rights and approval/file request deadlines for easy project coordination. GDPR-compliant sending of encrypted file attachments or complete emails via DRACOON for Outlook. Rely on end-to-end encryption, which also includes client-side encryption. Only it offers maximum protection for your data. With this type of encryption, not even an admin or DRACOON as the operator can decrypt your data, because the key remains with the owner at all times. Many other providers handle this differently. -
12
PDFEncrypt
PDFEncrypt
PDFEncrypt is a free, open source utility to encrypt PDF files using standard PDF encryption algorithms. When a document is encrypted, its contents become unreadable. An authorized user can decrypt the document to obtain access to the contents. If a PDF document is encrypted with a password, the user must specify the password before the document can be viewed in Adobe Reader or Adobe Acrobat. PDFEncrypt provides a means to encrypt any standard PDF document for free, without the need to purchase the Adobe Acrobat software or upload your confidential PDF files to a third-party server for encryption. The app runs directly on your Windows PC and allows you to specify a password (required to open the document) as well as many options and permissions to apply to the PDF file.Starting Price: Free -
13
RightsManager
FileOpen Systems
FileOpen's DRM solution operates as a control layer within industry-standard formats and applications. The system includes tools to encrypt documents, client-side decryption software that runs inside the most common viewer applications, and server software that uses a published control protocol that can also be implemented in your own solution. FileOpen uses industry-standard encryption via the methods defined in the appropriate format specification. For PDF this means AES-256 for PDF (ISO 32000) 2.0 compatibility and RC4-128 for backward compatibility to earlier versions of PDF. For MSOffice files we use AES as implemented by Microsoft via the add-in API layer. Documents encrypted with FileOpen can be opened only when, where and how the publisher's PermissionServer allows. Access may be granted with any combination of permissions to print, edit, copy, annotate, sign, save changes and other controls.Starting Price: $3000.00/year -
14
SekurVPN
Sekur Private Data
SekurVPN creates a secure, encrypted connection between your device and the Internet, and lets you access the web safely and privately by routing your connection through a server and hiding your online actions. All of the data you send and receive is hidden from prying eyes. This includes your Internet Service Provider (ISP), potential hackers, and even government surveillance agencies. It also can help you bypass geographic restrictions and censorship. SekurVPN software client on the user's device encrypts the device's connection request sent to the associated VPN server. Once the connection is established, requests for information are encrypted and go from the user's device to the VPN server. The VPN server decrypts the request and uses the Internet to obtain the information. Once obtained, the VPN server then encrypts and returns the information, which is decrypted by the client software.Starting Price: $9 per month -
15
Hornetsecurity Email Encryption
Hornetsecurity
Business emails often contain in-house, personal, or other sensitive content that could be intercepted and accessed without authorization if inadequately protected. Ensure all-around encrypted exchange of emails with Email Encryption from Hornetsecurity for reliable, secure email communication. Outgoing emails are automatically encrypted with one of the common encryption technologies (PGP, S/MIME, or TLS), depending on the set policy and availability of the corresponding certificates, without any further user intervention. If the sender’s public key is available, their emails are automatically decrypted and delivered to the recipient. Encryption of data has become a priority because of compliance requirements. In a business environment, the exchange of sensitive files and information takes place primarily via email communication. Encryption of the transmission path is essential to protect this data. -
16
SAV7
SAV7
SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards. -
17
SecureZIP
PKWARE
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement. -
18
EncryptRIGHT
Prime Factors
EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.Starting Price: $0 -
19
Terra
Terra
Antiquated on-premise systems are a liability. Streamline your claims operations and improve efficiency with Terra's Automation, Integration, and Intelligence. Terra's products include Claims Management, Policy Management, Benchmark, and an Ancillary Services Marketplace. Manage risk with Automation, Cloud-Native, Integration, and Intelligence! Terra is a Cloud-Native Risk Management Information System for Property & Casualty Insurance. -
20
SightGain
SightGain
Cybersecurity leaders: Stop worrying and know that you are protected. SightGain is the only integrated risk management solution focused on cybersecurity readiness. SightGain tests and measures readiness using real-world attack simulations in your live environment. SightGain first quantifies your organization’s risk exposure including potential financial loss, downtime, or data loss. Then it assesses your readiness posture identifying the specific strengths and weaknesses in your production environment. Finally, it enables you to prioritize investments that will optimize your security readiness across people, processes, and technology. SightGain is the first automated platform to provide verifiable insights into your security people, process and Technology. We go beyond what Breach and Attack Simulation platforms do to now include people and process. With SightGain, you can continuously test, measure, and improve your security posture against the latest attacks. -
21
StealthDisk Mobile
Security Group Six
StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.Starting Price: $49.95 one-time payment -
22
FileMarket
FileMarket
FileMarket.xyz is a next‑generation Web3 file‑sharing and marketplace platform that allows users to tokenize, store, sell, and swap digital files as NFTs using its Encrypted FileToken (EFT) standard, offering complete on‑chain programmable access and tokenized paywalls. Built on Filecoin (FVM/FEVM), IPFS, and multi‑chain support (including ZkSync and Ethereum), it provides perpetual decentralized storage, user‑controlled privacy, and lifelong access via smart contracts. Files are encrypted and stored symmetrically on Filecoin via Lighthouse; creators mint an NFT that encapsulates the encrypted content and set access terms. Buyers reserve funds in a smart contract, share their public key, and upon purchase receive an encrypted decryption key, downloading and decrypting the file. A backend listener and fraud‑reporting system ensures only correctly decrypted files complete a sale, and ownership transfers trigger secure key exchanges. -
23
Fasoo Secure Email
Fasoo
Allow users to send decrypted documents through email without having to remove the encryption before sending. This email-based DLP tool provides an exception for encrypted documents through an approval process so internal documents always remain encrypted. Once approved, documents are decrypted by the server prior to sending them. Decrypt documents automatically as users email them without requiring the sender to request approval to decrypt the document before sending it to a recipient. Maintain document security throughout your environment, since unprotected documents are not stored on the user’s PC or mailbox. -
24
SimpleumSafe
Simpleum
Nowadays it is not enough "only" to encrypt your data to be protected. If you want to view, organize, or edit the encrypted files, they also must be protected. It is important not to leave any trace on the system, and even if a Trojan looks over your shoulder, it can not copy all your files to the Internet. SimpleumSafe goes a different way than most other encryption programs. After authorization with a password, the files are not provided in the file system. Otherwise they would be completely vulnerable from this moment on. SimpleumSafe makes its own file system and has its own finder. Thus the files remain encrypted for the entire time. 100% of your data is encrypted with AES-256. This allows you to use the same encryption technology as banks, governments and industrial enterprises. When editing and in the preview, the data remains encrypted throughout. After editing, the data are automatically imported into the Safe again.Starting Price: $37.99 one-time payment -
25
Trellix Data Encryption
Trellix
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized. -
26
Xecrets Ez
Axantum Software AB
Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.Starting Price: €15/year -
27
Seald
Seald
Every industry has its own data security challenges: strengthening customer trust, achieving compliance, minimizing the consequences of a data breach, ... Seald addresses these challenges by offering to simply integrate end-to-end encryption into your applications. The privacy of your customers' data will be assured by design with Seald's certified technology, protecting them even in the event of a data breach. By using server-side encryption (including KMS, HSM or BYOK), the data is first transferred in its clear-text version and is then protected with encryption by the server. The servers therefore have access to a clear-text version of the data, which means that if compromised, the data would become vulnerable. By using Seald, data is secured on the client side, before being sent to the server. This way, neither Seald nor the cloud hosting company can decrypt the protected data, even if servers are compromised.Starting Price: €499 per month -
28
ElysianNxt
ElysianNxt
The .NXT Platform by ElysianNxt is a next-generation risk management solution designed to empower organizations in the rapidly evolving regulatory market. Built from the ground up, it leverages modern technologies such as data streaming, targeted scalability, microservices architecture, polyglot architecture, and open source adoption to transform traditional batch-oriented processes into near real-time operations. This integrated risk platform offers comprehensive scenario analysis and can be deployed on-premise or as a SaaS solution, providing unparalleled operational resilience and real-time data processing. Its microservices architecture ensures high availability and fault tolerance, while the database-agnostic design offers flexibility and adaptability across various systems. The platform's embedded simulation framework allows users to run stress tests across all risk types without requiring separate environments, enabling limitless simulations. -
29
Ciphermail Appliance
in-put
Email encryption with CipherMail Most emails are sent in plain text. This means that anyone who has access to the data stream can read the content of the emails. This is unacceptable for most companies, institutions and organizations and may also violate applicable law. E-mail encryption ensures security and trust in communication. CipherMail is a central mail transfer agent (MTA) that works on the “store and forward” principle. Incoming e-mails, regardless of whether they are from internal or external sources, are only saved until they have been encrypted / decrypted and can be forwarded to the recipient. This happens without changing the email client and is possible in combination with any SMTP server! E-mail encryption can be done using S / MIME, PGP or in a PDF file - in principle or triggered by a trigger in the subject line. CipherMail also includes a Data Leak Prevention (DLP) module.Starting Price: $670 one-time payment -
30
BIC Platform
GBTEC Software AG
BIC Platform is a holistic BPM software that covers the whole life cycle of process management. The vendor says it has an intuitive design that allows users to quickly start with process modeling and manage the full process cycle up to the optimization. It offers extensive features for governance and document management, as well as review and release workflows. With its modular setup, BIC Platform aims to be adaptable to user needs. BIC Platform can be operated either as a Public Cloud, Private Cloud, or On-Premises.Starting Price: $12.50/one-time -
31
AnySecura
AnySecura
AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.Starting Price: $216/month -
32
Fortress
Fortress Labs
Fortress offers fully-isolated, secure-by-design availability environments that run “shadow” VMs of your industrial applications in order to provide unparalleled availability and resilience. The Integrity Environment offers a robust, agent-less snapshotting mechanism, which dynamically captures client-specific control system configurations, coupled with malware scanning and encryption/decryption engines that ensure the integrity and confidentiality of system backups. The execution environment contains specialized tools for actually running secondary copies of industrial control system applications within purpose-built, hardened virtual machines, “hydrated” by configuration data from the integrity environment. All components of the Fortress platform are kept on specialized infrastructure that is logically and physically separated from the client’s primary network. Whereas traditional high-availability systems are vulnerable to malicious lateral attacks. -
33
BooleBox
Boole Server
BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011. -
34
SafeConsole
DataLocker
Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.Starting Price: $28 per device per year -
35
R&S Trusted Gate
Rohde & Schwarz Cybersecurity
R&S®Trusted Gate – Secure Data Exchange provides secure exchanging of sensitive data between authorized partners. Data is automatically encrypted and can be securely synchronized from an internal network to all major online file sharing service. Customers can define deployment, encryption and authentication without relying on a third-party service provider. No confidential data will be exposed to a cloud storage provider or sharing service. Secure sharing of data with the R&S®Trusted Gate, Secure Data Exchange is simple and efficient. Customers can define the internal network folders that need to be shared with external partners. As soon as files will be stored in these folders, R&S®Trusted Gate is immediately syncing the confidential data to the defined external target. Data will be automatically encrypted. This solution is not only limited to office file types but it is applicable to almost all scenarios, e.g. server migration and backups. -
36
Cypherix Secure IT
Cypherix Software
Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.Starting Price: $29.95 -
37
United Safety Sophia
United Safety
One of the key challenges of turnaround management is dealing with the time-consuming task of permitting. That’s is why United Safety developed Sophia, an integrated risk management software that offers a one-stop solution for permit-to-work, as well as access validation, document management, checklists management and collision detection to efficiently allocate resources. Sophia allows users to improve permit-to-work processing time including tracking, recording, and release by distributing workload across multiple servers, manages access control, bill books, legal requirements, operations management documents, and safety forms through its 4 components. -
38
STREAM Integrated Risk Manager
Acuity Risk Management
STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information. -
39
Lockystar
Lockystar
Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.Starting Price: $0 -
40
Folder Lock
NewSoftwares.net
Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.Starting Price: $39.95/one-time/user -
41
KodeFile
1SQ Technologies
The hardest part of encryption is dealing with the encryption keys. Until now! KodeFile's Key On Demand Encryption (KODE) generates and stores a unique key for every file you encrypt. Then on demand, shares the secret keys with your Confidants so that they can decrypt. KodeFile never possesses your files. You separately store and share the files as you see fit (email, cloud, flash drive, etc.), ensuring you are always in control of your privacy. KodeFile generates and stores a unique key for every file you encrypt. Shares any key on demand. The keys are secret to everyone, ensuring they are never exposed and shared with unauthorized parties. -
42
ColorCodeIT
Direct Line To Compliance
ColorCodeITTM is dashboard-inspired software that gives you real-time updates on your compliance status, based on indisputable metrics derived from the compliance standards themselves. Files are stored in highly secure government database. Uploads and downloads are encrypted with authentication on a separate server. Configurable internal security between departments. Manages document contents for compliance by page, section and location. Pre-loaded with DL2C color-coded and dissected standards, customized to your evidence. Maps pages/sections of evidence to the phrases of the standards. Shows reminders for the most critical task due. -
43
Auditrunner
Auditrunner
The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000+ business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.Starting Price: $850/month -
44
FormatPDF
FormatPDF
FormatPDF is a website that provides a variety of online tools for working with PDF documents. These tools include PDF conversion, merging and splitting, compression, encryption and decryption, as well as editing and annotating PDF files. With FormatPDF, users can easily convert a wide range of document formats to PDF, including Word, Excel, PowerPoint, and image files. The website also allows users to merge multiple PDF files into a single document, or to split a large PDF into smaller ones. In addition to conversion and manipulation tools, FormatPDF.com offers features for improving the quality and security of PDF documents. The website includes tools for compressing PDF files, which can reduce the size of large documents for easier sharing and storage. Users can also encrypt PDF files with passwords to restrict access, or decrypt protected files if they have the necessary credentials.Starting Price: $4.90/month -
45
Fission
Fission
Use the Fission CLI to sign up, and instantly register and publish apps. Free subdomain and SSL included. Read and write files and data directly from the web, including on mobile. Versioning and archive links built in. Add passwordless logins, and a personal data store for every account. No data exports needed: your users always have access. Don't leak your users' data, because you don't need to store it. User data is end-to-end encrypted, and encrypted at rest. We integrate modern, advanced browser features into our SDK. Run your web apps offline, encrypt data, and more. We build on top of the InterPlanetary File System (IPFS), which powers a global data commons. -
46
Ente Auth
Ente
Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.Starting Price: Free -
47
Ubiq
Ubiq Security
Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.Starting Price: $0.001 per encrypt -
48
Bad actors take advantage of SSL/TLS encryption to hide malicious payloads to outsmart and bypass security controls. Don’t leave your organization vulnerable to attack with security solutions that can’t inspect encrypted traffic efficiently at scale. BIG-IP SSL Orchestrator delivers high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection that exposes threats and stops attacks before they happen. Maximize infrastructure and security investments with dynamic, policy-based decryption, encryption, and traffic steering through security inspection devices. Protect against outbound traffic dispersing malware, exfiltrating data, or reaching out to a command-and-control server to trigger attacks. Decrypt incoming encrypted traffic to ensure it’s not hiding ransomware, malware, or other threats that lead to attacks, infections, and data breaches. Prevent new security blind spots by enabling greater flexibility without architectural changes.
-
49
Intellicta
TechDemocracy
Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems. -
50
Aurora Files
Afterlogic Corp
Your files in your cloud on your rules. Aurora Files is an open-source file storage platform for small teams and personal users. Self-hosted on your infrastructure, you stay in control over your data. Share files and folders with your teammates. As a backend, can use server's local or remote S3-compatible storage. Access your data with any WebDAV client, including the standard Windows Explorer. Rebrand Aurora Files with your colors, styles and images (including mobile apps). Access your files from any device, iOS or Android. Enables two-way sync of a user's local folders and the cloud, for both personal and corporate storage. Enable access to folders and files for everyone with the link. Handy for developers, makes it easier to customize code, perform integration with other systems, create and maintain your plugins. Aurora Files includes Paranoid Encryption module which provides strong AES-256 browser-based encryption.Starting Price: $499 per year