Alternatives to Opaque Systems

Compare Opaque Systems alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Opaque Systems in 2024. Compare features, ratings, user reviews, pricing, and more from Opaque Systems competitors and alternatives in order to make an informed decision for your business.

  • 1
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. Opaque Systems View Software
    Visit Website
  • 2
    QuantaStor

    QuantaStor

    OSNEXUS

    QuantaStor is a unified Software-Defined Storage platform designed to scale up and out to make storage management easy while reducing overall enterprise storage costs. With support for all major file, block, and object protocols including iSCSI/FC, NFS/SMB, and S3, QuantaStor storage grids may be configured to address the needs of complex workflows which span sites and datacenters. QuantaStor’s storage grid technology is a built-in federated management system which enables QuantaStor servers to be combined together to simplify management and automation via CLI and REST APIs. The layered architecture of QuantaStor provides solution engineers with unprecedented flexibility and application design options that maximizes workload performance and fault-tolerance for a wide range of storage workloads. QuantaStor includes end-to-end security coverage enabling multi-layer data protection “on the wire” and “at rest” for enterprise and cloud storage deployments.
    Partner badge
    Compare vs. Opaque Systems View Software
    Visit Website
  • 3
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.
  • 4
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 5
    Tresorit

    Tresorit

    Tresorit

    End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shield
    Leader badge
    Starting Price: $10.42/month
  • 6
    N-able Mail Assure
    N-able Mail Assure cloud-based email security solution provides advanced threat protection for inbound and outbound email using collective threat intelligence, 24/7 email continuity, and long-term email archiving. The service includes a multitenant web-interface with predefined settings, reporting, and views designed to ensure control and visibility over email flows. N-able Mail Assure’s proprietary technology incorporates input from processing large volumes of email data that feeds the Intelligent Protection and Filtering Engine. This combined with real-time pattern threat recognition leveraging a variety of filtering technologies help protect against spam, viruses, phishing attacks, impersonation, spoofing, malware, and other email-borne threats.
  • 7
    Quantum Origin

    Quantum Origin

    Quantinuum

    Experience the world’s only quantum-computing-hardened encryption keys, ensuring provably superior protection and allowing you to seamlessly strengthen your existing cybersecurity systems for enhanced security today, and into the future. Every organization owns sensitive data that must be kept secret at all costs. Quantum Origin adds unmatched cryptographic strength to existing cybersecurity systems, giving your enterprise a long-term edge against cyber criminals. Maintaining the trust of customers, shareholders, and regulators means adapting and strengthening your cybersecurity foundations. Adopting Quantum Origin showcases your commitment to staying ahead of potential threats. Quantum Origin verifiably strengthens the cryptographic protection around your technology and services, proving you take the privacy and security of your customer's data as seriously as they do. Let your customers know their data is safe with the ultimate in cryptographic protection.
  • 8
    BestCrypt

    BestCrypt

    Jetico

    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 9
    HashiCorp Vault

    HashiCorp Vault

    HashiCorp

    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 10
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a revolutionary steganography and file encryption software that allows you to not only encrypt file and folder structures that contain confidential data but it also offers you the possibility to hide files, making it completely invisible to any user. Encrypt file contents and hide files using east-tec InvisibleSecrets, a complete privacy and cryptography software solution. Other useful features (password manager, file shredder, program lock) will be described below. east-tec InvisibleSecrets is a file encryption software that helps you protect your confidential information from prying eyes or unwanted access by helping you encrypt file or folder structures on your computer. Featuring strong file encryption algorithms, it ensures you the maximum security level you need for complete privacy protection. Securely hide files and your sensitive information.
    Starting Price: $39.95 one-time payment
  • 11
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • 12
    WinMagic SecureDoc
    SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).
  • 13
    Polar Crypto Component

    Polar Crypto Component

    Polar Software

    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. In all applications developed for conducting business transactions, where absolute confidentiality is needed. For digital signature creation and validation. In e-commerce web site applications that store sensitive information such as clients’ credit card details. In desktop applications that encrypt confidential files on your computer or computer network.
    Starting Price: $239.00/one-time/user
  • 14
    Boxcryptor

    Boxcryptor

    Boxcryptor

    Boxcryptor protects your company data in the cloud: in OneDrive, SharePoint, Dropbox, Google Drive, and more. Boxcryptor encrypts your files directly on the device, therefore the data is encrypted and secured before it is moved to the storage of your choice. Boxcryptor is available on Windows, macOS, iOS, and Android. Work cross-platform without limitations. Boxcryptor adds security to over 30 cloud providers. Protect your NAS, file servers, and local data as well. Boxcryptor ensures the confidentiality of information while the cloud provides availability and a backup option. Boxcryptor has been audited by the security experts at Kudelski Security. The quality and security of the software is verified. Optionally confirm sign-ins on a second device with 2FA. Manage users more easily with SSO, SCIM, or Active Directory support. Collaborate securely with Boxcryptor, in your own team, or with partners, thanks to group features, our Microsoft Teams encryption, or Whisply.
  • 15
    iSecurity Field Encryption

    iSecurity Field Encryption

    Raz-Lee Security

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.
  • 16
    Atakama

    Atakama

    Atakama

    One-of-a-kind information security solution designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to fit your business needs and user workflows. Whether protecting from external or internal threats, securing confidential data is always a top priority. Atakama lets you protect sensitive information such as earnings reports, PII, HR records, M&A deal documents, engineering and scientific data, internal memoranda, investment models, and much more. There's an ever-increasing need for individual file-level encryption. State and federal cybersecurity regulations are expanding and becoming increasingly more onerous. Ransomware attacks that involve file theft and publication can devastate any organization. With Atakama, files are always client side encrypted so it's always the encrypted version of the file that lives in the cloud or on the server.
  • 17
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 18
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 19
    PureEncrypt

    PureEncrypt

    PureVPN

    Your files will be a complete mystery to anyone who doesn’t have the password. Keep your files in secure cloud storage or lock them away on your personal computer. Get cloud storage with built-in encryption so you can protect your documents, photos, and more. Make all your photos, videos, and files private with total encryption. Export encrypted files and folders with complete privacy if you choose to share them with others. You can encrypt your files with PureEncrypt, and save the new files in your cloud storage. Combine security and convenience so you can store files in a place you can always reach. Lock your passports, private documents, and more behind password-protected vaults. Create and organize unlimited secure vaults and protect them so your files stay secure. Sync your password-protected vaults from anywhere so you can stay secure. Be confident in your privacy while you stay logged in on up to 10 computers.
    Starting Price: $3.99 per month
  • 20
    Enveil

    Enveil

    Enveil

    Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization.
  • 21
    MOVEit

    MOVEit

    Progress

    MOVEit Managed File Transfer (MFT) software is used by thousands of organizations around the world to provide complete visibility and control over file transfer activities. Assure the reliability of core business processes and the secure and compliant transfer of sensitive data between partners, customers, users and systems with MOVEit. MOVEit's flexible architecture allows you to choose the exact capabilities to match your organizations specific needs. MOVEit Transfer enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It provides the security, centralized access controls, file encryption and activity tracking needed to ensure operational reliability and compliance with SLA, internal governance and regulatory requirements. MOVEit Automation works with MOVEit Transfer or FTP systems to provide advanced workflow automation capabilities without the need for scripting.
  • 22
    SecureZIP

    SecureZIP

    PKWARE

    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 23
    Salesforce Shield

    Salesforce Shield

    Salesforce

    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 24
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.
    Starting Price: $29.95
  • 25
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 26
    Symantec Endpoint Encryption
    Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.
  • 27
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
  • 28
    IBM Security Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 29
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.
  • 30
    Google Cloud Dataproc
    Dataproc makes open source data and analytics processing fast, easy, and more secure in the cloud. Build custom OSS clusters on custom machines faster. Whether you need extra memory for Presto or GPUs for Apache Spark machine learning, Dataproc can help accelerate your data and analytics processing by spinning up a purpose-built cluster in 90 seconds. Easy and affordable cluster management. With autoscaling, idle cluster deletion, per-second pricing, and more, Dataproc can help reduce the total cost of ownership of OSS so you can focus your time and resources elsewhere. Security built in by default. Encryption by default helps ensure no piece of data is unprotected. With JobsAPI and Component Gateway, you can define permissions for Cloud IAM clusters, without having to set up networking or gateway nodes.
  • 31
    Smartcrypt

    Smartcrypt

    PKWARE

    Companies that use PKWARE’s Smartcrypt to protect data within the organization can also use Smartcrypt to share encrypted files with individuals and groups outside the company. The free Smartcrypt Reader is available for download by anyone, and can be used to decrypt and open files that have been secured using Smartcrypt. Smartcrypt Reader is available for Windows and Mac platforms. Unlike other approaches that require senders to share encryption passphrases with recipients or deal with complex PKI workflows, the Smartcrypt Reader can automatically retrieve encryption keys for authorized users—even external users—eliminating one of the biggest security challenges in external data exchange. When a Smartcrypt user needs to share sensitive data with someone outside the company, the Smartcrypt user creates (or selects) a Smartkey that is associated with the recipient’s email address. Files can then be encrypted using that Smartkey and shared via email, cloud storage, or any other medium.
  • 32
    WinZip SafeMedia
    Employees need the flexibility to take digital data with them wherever they go. Businesses must ensure this data is always secured. WinZip SafeMedia enables users to quickly and safely store, manage, and transport files on removable media (e.g., removable storage devices such as CDs, DVDs, and USB drives and sticks), empowering IT admins to uphold protocols and standards that defend your business against online and offline threats. Tailor security policies to your organization’s needs. Customize settings for individuals or groups, and monitor activity as needed. Use drag and drop plus automatic security features to provide end users with a simple, easy solution that doesn’t hinder productivity. Leverage FIPS 140-2 compliant and FIPS 197 certified encryption and compression to protect data on removable media. Best-in-class encryption methodologies protect classified information while enabling storage flexibility and centralized control.
  • 33
    StratoKey

    StratoKey

    StratoKey

    StratoKey CASB specializes in securing cloud and SaaS applications with Encryption, Monitoring, Analytics and Defence (EMAD™). With the StratoKey CASB, organizations conduct secure and compliant business in the cloud. StratoKey is application agnostic and transparent to your users, allowing your employees freedom to use the best online tools while protecting your sensitive data. StratoKey is your eyes and ears in the cloud. Watching over your users and providing you with complete visibility into their interactions with your applications. StratoKey CCM helps organizations move from ad hoc compliance actions to a structured, organized and auditable compliance program. Compliance programs are driven by Discovery, Automation, Tasking and Reporting.
  • 34
    Sealit

    Sealit

    Sealit Technologies

    When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you.
  • 35
    Conjurers Encrypter
    Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing.
  • 36
    DropSecure

    DropSecure

    DropSecure

    With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.
    Starting Price: $10 per month
  • 37
    Ubiq

    Ubiq

    Ubiq Security

    Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.
    Starting Price: $0.001 per encrypt
  • 38
    AxCrypt

    AxCrypt

    AxCrypt

    AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.
    Starting Price: $3.63 per month
  • 39
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
  • 40
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • 41
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 42
    Fabasoft Secomo
    Fabasoft Secomo is an encryption architecture with true end-to-end encryption. Encryption takes place at the workplace or mobile device and not in the cloud. This ensures end-to-end encryption from the sender to the receiver. The Fabasoft credo "Continuous protection through encryption" means that only you have access to the Fabasoft Secomo and your settings. Fabasoft has neither interfaces to the appliance nor your keys. Fabasoft Secomo is an appliance consisting of Fabasoft Secomo software and two highly available servers in a network. The servers have hardware security modules that meet the requirements of FIPS 140-2 Level 4 certification for physical security. Fabasoft Secomo supports client certificates for authentication. You decide who has access to the security appliance and may work with encrypted documents. Fabasoft Secomo enables simple operation and has its own management user interface.
  • 43
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock devices that are protected by full disk encryption and keep users productive while they work remotely. Ensure that you meet critical industry guidelines and government regulations for protecting customer and patient data. Leverage your experience with ZENworks to reduce the cost of implementing Full Disk Encryption.
  • 44
    Roseman Labs

    Roseman Labs

    Roseman Labs

    Roseman Labs enables you to encrypt, link, and analyze multiple data sets while safeguarding the privacy and commercial sensitivity of the actual data. This allows you to combine data sets from several parties, analyze them, and get the insights you need to optimize your processes. Tap into the unused potential of your data. With Roseman Labs, you have the power of cryptography at your fingertips through the simplicity of Python. Encrypting sensitive data allows you to analyze it while safeguarding privacy, protecting commercial sensitivity, and adhering to GDPR regulations. Generate insights from personal or commercially sensitive information, with enhanced GDPR compliance. Ensure data privacy with state-of-the-art encryption. Roseman Labs allows you to link data sets from several parties. By analyzing the combined data, you'll be able to discover which records appear in several data sets, allowing for new patterns to emerge.
  • 45
    Gilisoft #1 All-in-One Toolkit Suite
    22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. In conclusion, you can do almost multimedia work with audio and video tools, and you can do encryption operation with encryption software. Just free download and experience it now!
    Starting Price: $149.99
  • 46
    TripleBlind

    TripleBlind

    TripleBlind

    At TripleBlind,™ we offer digital privacy as a service. Our suite of tools enables companies to safely provide and consume extremely sensitive data and algorithms in encrypted space, in the most private and secure setting that has ever existed. Exchanging raw data exposes all parties to a variety of compromises, making privacy and monetization of information assets, like data and algorithms, a complex balancing act. Data exchange and use relies on good faith adherence to Legal Terms. The data economy requires costly IT and security infrastructure. Stray Data can be left behind after use, unsecured and vulnerable to counter-parties. Aggregating data from various providers is expensive and complex. Data de-identification reduces the value and training accuracy of data. Decryption kills the financialdata economy, learn how TripleBlind can unlock liquidity and new partnership opportunities. See what we’re already doing for clients just like you.
  • 47
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
  • 48
    Cryptainer Pro

    Cryptainer Pro

    Cypherix Software

    Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro allows you to encrypt any file or folder on any Windows PC. Password protect any file or folder with strong Encryption. Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords. A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords for each encrypted file. Just Drag and Drop to hide any data of any kind (documents, pictures, entire folders or even run programs) in a safe password protected vault. Cryptainer's ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. Simple, Secure, Easy-to-Use. Save Encrypted Vaults to Cloud Storage Providers. Runs on all versions of Windows. A must have for every desktop.
    Starting Price: $69.95
  • 49
    Apache Spark

    Apache Spark

    Apache Software Foundation

    Apache Spark™ is a unified analytics engine for large-scale data processing. Apache Spark achieves high performance for both batch and streaming data, using a state-of-the-art DAG scheduler, a query optimizer, and a physical execution engine. Spark offers over 80 high-level operators that make it easy to build parallel apps. And you can use it interactively from the Scala, Python, R, and SQL shells. Spark powers a stack of libraries including SQL and DataFrames, MLlib for machine learning, GraphX, and Spark Streaming. You can combine these libraries seamlessly in the same application. Spark runs on Hadoop, Apache Mesos, Kubernetes, standalone, or in the cloud. It can access diverse data sources. You can run Spark using its standalone cluster mode, on EC2, on Hadoop YARN, on Mesos, or on Kubernetes. Access data in HDFS, Alluxio, Apache Cassandra, Apache HBase, Apache Hive, and hundreds of other data sources.
  • 50
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.