Alternatives to Smartcrypt

Compare Smartcrypt alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Smartcrypt in 2024. Compare features, ratings, user reviews, pricing, and more from Smartcrypt competitors and alternatives in order to make an informed decision for your business.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
    Compare vs. Smartcrypt View Software
    Visit Website
  • 2
    Trustifi

    Trustifi

    Trustifi

    Trustifi offers industry-leading solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, data encryption & more. Easily deployed on: Outlook, Gmail, or any email server by relay **Advanced Threat Protection**: -Malware and ransomware virus detection, BEC attack prevention and alerts **Data Loss Prevention**: -100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more **Encryption**: -NSA-grade. Select Enterprise customers have access to company branding and product white labeling. Plus one-on-one team training. Encryption needs aren’t one-size-fits-all, so your email security platform shouldn’t be either. Customized solutions are available upon request, often without charge.
  • 3
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.
  • 4
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 5
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 6
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
  • 7
    Tresorit

    Tresorit

    Tresorit

    End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shield
    Leader badge
    Starting Price: $10.42/month
  • 8
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • 9
    HashiCorp Vault

    HashiCorp Vault

    HashiCorp

    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 10
    Anchor

    Anchor

    Anchor

    Anchor’s file security platform is built on zero trust principles to secure and control your sensitive files, but remain invisible to end users. Traditional cybersecurity focuses on locking down networks, devices, and people. All of this is done in the name of data security. But, once individual files are moved, shared, or stolen, the data is no longer protected. Even worse, these controls get in the way and frustrate business users to the point they intentionally work around them. Cyber insurance premiums are rising, as well as the requirements for obtaining coverage. At the same time, coverage is reducing. Most insurance companies require MFA to get coverage and exclude paying ransoms for data that is stolen. Satisfy MFA while also eliminating the ability for your data to be stolen and used against you.
  • 11
    Salesforce Shield

    Salesforce Shield

    Salesforce

    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 12
    Enveil

    Enveil

    Enveil

    Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization.
  • 13
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
  • 14
    WinZip SafeMedia
    Employees need the flexibility to take digital data with them wherever they go. Businesses must ensure this data is always secured. WinZip SafeMedia enables users to quickly and safely store, manage, and transport files on removable media (e.g., removable storage devices such as CDs, DVDs, and USB drives and sticks), empowering IT admins to uphold protocols and standards that defend your business against online and offline threats. Tailor security policies to your organization’s needs. Customize settings for individuals or groups, and monitor activity as needed. Use drag and drop plus automatic security features to provide end users with a simple, easy solution that doesn’t hinder productivity. Leverage FIPS 140-2 compliant and FIPS 197 certified encryption and compression to protect data on removable media. Best-in-class encryption methodologies protect classified information while enabling storage flexibility and centralized control.
  • 15
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 16
    Proton Mail

    Proton Mail

    Proton AG

    Proton Mail is incorporated in Switzerland and all our servers are located in Switzerland. This means all user data is protected by strict Swiss privacy laws. All emails are secured automatically with end-to-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first. We believe email privacy should be available to all. That's why our code is open source and basic Proton Mail accounts are always free. You can support the project by donating or upgrading to a paid account. Proton Mail can be used on any device without software install. Proton Mail Business allows you to keep your business email address. Send and receive encrypted emails both inside and outside of your organisation.
    Leader badge
    Starting Price: $6.25 per user per month
  • 17
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.
    Starting Price: $29.95
  • 18
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 19
    Symantec Endpoint Encryption
    Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.
  • 20
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 21
    SecureZIP

    SecureZIP

    PKWARE

    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 22
    iSecurity Field Encryption

    iSecurity Field Encryption

    Raz-Lee Security

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.
  • 23
    Atakama

    Atakama

    Atakama

    One-of-a-kind information security solution designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to fit your business needs and user workflows. Whether protecting from external or internal threats, securing confidential data is always a top priority. Atakama lets you protect sensitive information such as earnings reports, PII, HR records, M&A deal documents, engineering and scientific data, internal memoranda, investment models, and much more. There's an ever-increasing need for individual file-level encryption. State and federal cybersecurity regulations are expanding and becoming increasingly more onerous. Ransomware attacks that involve file theft and publication can devastate any organization. With Atakama, files are always client side encrypted so it's always the encrypted version of the file that lives in the cloud or on the server.
  • 24
    RMail

    RMail

    RPost

    RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.
    Starting Price: $7/month/user
  • 25
    Boxcryptor

    Boxcryptor

    Boxcryptor

    Boxcryptor protects your company data in the cloud: in OneDrive, SharePoint, Dropbox, Google Drive, and more. Boxcryptor encrypts your files directly on the device, therefore the data is encrypted and secured before it is moved to the storage of your choice. Boxcryptor is available on Windows, macOS, iOS, and Android. Work cross-platform without limitations. Boxcryptor adds security to over 30 cloud providers. Protect your NAS, file servers, and local data as well. Boxcryptor ensures the confidentiality of information while the cloud provides availability and a backup option. Boxcryptor has been audited by the security experts at Kudelski Security. The quality and security of the software is verified. Optionally confirm sign-ins on a second device with 2FA. Manage users more easily with SSO, SCIM, or Active Directory support. Collaborate securely with Boxcryptor, in your own team, or with partners, thanks to group features, our Microsoft Teams encryption, or Whisply.
  • 26
    Conjurers Encrypter
    Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing.
  • 27
    NordLocker

    NordLocker

    Tefincom

    Leading-edge encryption at your fingertips. We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords. Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients.
    Starting Price: $1.49 per month
  • 28
    Encrypto

    Encrypto

    MacPaw

    Encrypto takes any file or folder and adds AES-256 encryption to it. With encryption, you know your file is incredibly secure and that only the right person can access it. Rather than relay a password to the recipient, include a unique, embedded password hint that only they would be able to decipher. Send encrypted files via email, Messages, AirDrop, Dropbox, carrier pigeon with USB stick — however you send them, your files are protected. With Encrypto, not only can you encrypt and share files, but you can also save them to your own disk. Select your files, put them through Encrypto, and voilà — they’re protected. If you haven’t been living on Mars these last years, having a data encryption strategy is a must. Let Encrypto be part of it. It's easy to use and impossible to hack. Download and give it a spin right now.
  • 29
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • 30
    Roseman Labs

    Roseman Labs

    Roseman Labs

    Roseman Labs enables you to encrypt, link, and analyze multiple data sets while safeguarding the privacy and commercial sensitivity of the actual data. This allows you to combine data sets from several parties, analyze them, and get the insights you need to optimize your processes. Tap into the unused potential of your data. With Roseman Labs, you have the power of cryptography at your fingertips through the simplicity of Python. Encrypting sensitive data allows you to analyze it while safeguarding privacy, protecting commercial sensitivity, and adhering to GDPR regulations. Generate insights from personal or commercially sensitive information, with enhanced GDPR compliance. Ensure data privacy with state-of-the-art encryption. Roseman Labs allows you to link data sets from several parties. By analyzing the combined data, you'll be able to discover which records appear in several data sets, allowing for new patterns to emerge.
  • 31
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
  • 32
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 33
    AxCrypt

    AxCrypt

    AxCrypt

    AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.
    Starting Price: $3.63 per month
  • 34
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a revolutionary steganography and file encryption software that allows you to not only encrypt file and folder structures that contain confidential data but it also offers you the possibility to hide files, making it completely invisible to any user. Encrypt file contents and hide files using east-tec InvisibleSecrets, a complete privacy and cryptography software solution. Other useful features (password manager, file shredder, program lock) will be described below. east-tec InvisibleSecrets is a file encryption software that helps you protect your confidential information from prying eyes or unwanted access by helping you encrypt file or folder structures on your computer. Featuring strong file encryption algorithms, it ensures you the maximum security level you need for complete privacy protection. Securely hide files and your sensitive information.
    Starting Price: $39.95 one-time payment
  • 35
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 36
    WinGPG

    WinGPG

    Scand

    WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations: - Encryption/Decryption (we offer automatic zipping at encryption time, so your files are ready to be transmitted via email or any instant messenger immediately) - Signature/Verification - Key management (create, import, export, revoke) WinGPG main operational features are: - WinNT Explorer support via context menus - Global shortcuts working from the active explorer window or clipboard - Clipboard support for both texts and files - No complicated setup, you only run a batch file WinGPG is a fully functional tool, which offers the user an opportunity to manage keys and files easily. Password protected keys, default keys, and other useful tricks are available with WinGPG.
  • 37
    DropSecure

    DropSecure

    DropSecure

    With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.
    Starting Price: $10 per month
  • 38
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
  • 39
    Cubbit for Teams
    Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.
    Starting Price: €6 per user, per month
  • 40
    Sealit

    Sealit

    Sealit Technologies

    When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you.
  • 41
    Skiff

    Skiff

    Skiff

    Skiff is a private, end-to-end encrypted workspace with Mail, Calendar, Pages, and Drive products for completely secure communication and collaboration. All Skiff products are designed with security and privacy in mind. All apps are built with end-to-end encryption (E2EE), so you never have to share your personal information, sensitive data, or private keys with anyone else. At all times, only you can access the content of your emails. Generous free tier - Enjoy 10 GB of free storage for your email, attachments, documents, and notes. - Create up to 4 free email aliases to protect your identity. Open-source and audited - Skiff Mail is open-source, uses open-source cryptography, and undergoes external security audits. - You can access our whitepaper and code at skiff.com. No trackers or ads - Sign up and upgrade without sharing any personal information; use crypto payments in many different currencies to upgrade. - Your data is never collected, sold, or shared.
  • 42
    BooleBox

    BooleBox

    Boole Server

    BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011.
  • 43
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 44
    WinMagic SecureDoc
    SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).
  • 45
    Azure Information Protection
    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it’s shared with. Configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Add classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Track activities on shared data and revoke access if necessary. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data. Share data safely with coworkers as well as your customers and partners. Define who can access data and what they can do with it.
  • 46
    Vaporstream

    Vaporstream

    Vaporstream

    Vaporstream is how you have leakproof conversations, send disappearing messages, and stay in control of your information, all while remaining compliant. You should always have complete control over who can see your sensitive business information, when it can be forwarded, copied, shared, or saved, across your enterprise, and even after it reaches recipients’ devices. Get the convenience of traditional mobile apps with the functionality, reliability, and privacy your business demands. Our advanced content controls and enterprise-level security enable private and disappearing business communications while maintaining compliance with organizational and regulatory requirements. Send disappearing messages while maintaining compliance. You store your records and integrate them with your workflows. Communicate securely with external users. Mobile application with a desktop client. Shred conversations, not just messages.
    Starting Price: Free
  • 47
    TripleBlind

    TripleBlind

    TripleBlind

    At TripleBlind,™ we offer digital privacy as a service. Our suite of tools enables companies to safely provide and consume extremely sensitive data and algorithms in encrypted space, in the most private and secure setting that has ever existed. Exchanging raw data exposes all parties to a variety of compromises, making privacy and monetization of information assets, like data and algorithms, a complex balancing act. Data exchange and use relies on good faith adherence to Legal Terms. The data economy requires costly IT and security infrastructure. Stray Data can be left behind after use, unsecured and vulnerable to counter-parties. Aggregating data from various providers is expensive and complex. Data de-identification reduces the value and training accuracy of data. Decryption kills the financialdata economy, learn how TripleBlind can unlock liquidity and new partnership opportunities. See what we’re already doing for clients just like you.
  • 48
    GhostVolt

    GhostVolt

    GhostVolt Ltd

    GhostVolt is a security App which protects your privacy and stops unauthorised access to your files and folders and helps fight against cybercriminals who want to steal your data and use it for identity theft, ransomware, blackmail, and other criminal attacks. With GhostVolt, you can secure all your personal files including your health records, photos, movies, tax returns or any other document so you’re in control of who has access to your files and data, all the time. All your files are automatically encrypted with industry standard 256 AES encryption and because it works just like your regular file manager, you already know how to use it. GhostVolt works perfectly with Microsoft OneDrive and allows you to automatically backup and sync your protected files across your computers, you also get an integrated secure note manager, secure file sharing, file comments and tagging and so much more.
    Starting Price: $20 per year
  • 49
    BestCrypt

    BestCrypt

    Jetico

    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 50
    MOVEit

    MOVEit

    Progress

    MOVEit Managed File Transfer (MFT) software is used by thousands of organizations around the world to provide complete visibility and control over file transfer activities. Assure the reliability of core business processes and the secure and compliant transfer of sensitive data between partners, customers, users and systems with MOVEit. MOVEit's flexible architecture allows you to choose the exact capabilities to match your organizations specific needs. MOVEit Transfer enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It provides the security, centralized access controls, file encryption and activity tracking needed to ensure operational reliability and compliance with SLA, internal governance and regulatory requirements. MOVEit Automation works with MOVEit Transfer or FTP systems to provide advanced workflow automation capabilities without the need for scripting.