Alternatives to cryptography
Compare cryptography alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to cryptography in 2026. Compare features, ratings, user reviews, pricing, and more from cryptography competitors and alternatives in order to make an informed decision for your business.
-
1
SandboxAQ
SandboxAQ
The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches. -
2
QuSecure QuProtect
QuSecure
QuSecure's QuProtect is a comprehensive post-quantum cryptography software solution designed to secure data across various platforms, including network, cloud, IoT, edge devices, and satellite communications. It offers quantum-resilient cryptography, crypto-agility, zero-trust architecture, and quantum-strength keys, ensuring protection against both current and future cyber threats. QuProtect enables organizations to implement PQC with minimal disruption to existing systems, providing a seamless integration into their cybersecurity infrastructure. It supports hybrid post-quantum TLS, allowing for control over cryptographic algorithms and key management, and offers centralized control and management for cryptographic protocols across the network. QuProtect is deployed as a quantum-security-as-a-service architecture, combining orchestration, inventory, telemetry, and cryptographic controls into a single platform. -
3
Inkrypt AI
Inkrypt AI
Inkrypt.ai is an enterprise-grade cryptographic security and key management platform designed to deliver automated encryption, post-quantum readiness, and centralized cryptographic governance for modern software systems. The platform enables organizations to integrate encryption and key management directly into applications through generated SDKs while maintaining full operational visibility and compliance readiness. Inkrypt.ai provides end-to-end encryption across the data lifecycle, including key generation, secure storage, rotation, and access control. Its hybrid cryptographic architecture aligns with NIST post-quantum cryptography guidance, allowing enterprises to prepare for future quantum threats without disrupting existing systems. The platform includes a web-based administration and analytics console, real-time telemetry pipelines, centralized audit logging, and policy-driven access controls. Automated key rotation, zero-downtime cryptographic operations, and real-time se -
4
Ergo
Ergo Platform
Ergo builds advanced cryptographic features and radically new DeFi functionality on the rock-solid foundations laid by a decade of blockchain theory and development. Ergo draws on ten years of blockchain development, complementing tried and tested principles with the best peer-reviewed academic research into cryptography, consensus models and digital currencies. We start with solid blockchain basics and implement new and powerful cryptography natively. Our team has a solid background in core development with cryptocurrencies and blockchain frameworks including Nxt, Scorex and Waves, and our lean approach means we can prioritise new features and requirements quickly. -
5
OpenBSD
OpenBSD
OpenBSD is developed entirely by volunteers. The project's development environment and developer events are funded through contributions collected by The OpenBSD Foundation. Contributions ensure that OpenBSD will remain a vibrant and free operating system. Hence the OpenBSD project has embedded cryptography into numerous places in the operating system. We require that the cryptographic software we use be freely available and with good licenses. We do not directly use cryptography with nasty patents. We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country. Be as politics-free as possible; solutions should be decided on the basis of technical merit.Starting Price: Free -
6
PQShield
PQShield
PQShield offers a comprehensive suite of post-quantum cryptography solutions designed to future-proof digital infrastructures against the emerging threats posed by quantum computing. Their UltraPQ-Suite encompasses a range of hardware and software products optimized for various use cases, including ultra-fast, ultra-small, and ultra-secure implementations. PQShield's offerings include PQPlatform-Lattice, a compact, FIPS 140-3 CAVP-compliant cryptographic engine supporting lattice-based algorithms like ML-KEM and ML-DSA; PQPlatform-CoPro, which combines hash-based and lattice-based cryptography engines for seamless integration into existing security subsystems; and PQPlatform-TrustSys, a fully autonomous, PQC-focused root-of-trust subsystem designed for minimal integration effort and robust side-channel protection. PQCryptoLib provides a general-purpose cryptographic library supporting both post-quantum and classical algorithms, facilitating smooth transitions to quantum systems. -
7
LicenseDNS
LicenseDNS
With LicenseDNS, the process of verifying licenses within your software product becomes significantly streamlined, eliminating the need for complex cryptographic methods that can often be cumbersome and difficult to implement. Rather than relying on intricate cryptography embedded within your application, you can leverage the capabilities of DNS servers to handle all necessary cryptographic verification seamlessly and efficiently. Simply by sending a DNS query to any recursive DNS server, you can obtain verified license information with a high degree of confidence. LicenseDNS enables software vendors to implement licensing using DNSSEC. To validate a license, send a DNS query to any DNS server and receive cryptographically verified license data. All platforms and langauges are supported. LicenseDNS offers a user-friendly web-based License Manager application and hosts specialized DNS servers for activating, and deactivating licenses.Starting Price: €9/month/user -
8
AQtive Guard
SandboxAQ
AQtive Guard is a cybersecurity platform that helps organizations secure and manage cryptographic assets and non-human identities (NHIs) such as AI agents, keys, certificates, algorithms, and machine identities across their entire IT environment. It delivers continuous discovery and real-time visibility into NHIs and cryptography, integrating with existing security tools, cloud providers, and repositories to provide a unified view of security posture. Using advanced AI and large quantitative models, the platform analyzes vulnerabilities, prioritizes risks, and offers actionable insights with automated remediation workflows to fix issues and enforce policies such as credential rotation or certificate renewal. AQtive Guard supports compliance with evolving standards, including new NIST cryptographic protocols, and enables lifecycle management of cryptographic assets to reduce risk from current and future threats. -
9
AVX ONE
AppViewX
AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments. -
10
OpaqueVEIL
TecSec
CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly. -
11
iCrypto
iCrypto
Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.Starting Price: Free -
12
Cosmian
Cosmian
Cosmian’s Data Protection Suite delivers a comprehensive, next-generation cryptography platform to secure sensitive data and applications in use, at rest, and in motion across cloud and edge environments. It includes Cosmian Covercrypt, a high-performance hybrid classical and post-quantum encryption library with traceable, fine-grained access control; Cosmian KMS, an open-source, centralized key management system that enables massive client-side encryption on the fly; and Cosmian VM, a plug-and-play, verifiable confidential virtual machine that continuously cryptographically verifies its own integrity without disrupting existing workflows. An AI Runner (“Cosmian AI”) operates within the confidential VM to enable secure model training, querying, and fine-tuning, no coding required. All components integrate via simple APIs and deploy rapidly through AWS, Azure, or Google Cloud marketplaces, empowering organizations to build zero-trust architectures. -
13
Cellframe
Cellframe
Cellframe Network is a scalable open-source next generation platform for building and bridging blockchains and services secured by post-quantum encryption. We offer a stage for enterprises and developers for building a vast array of products ranging from simple low-level t-dApps to whole other blockchains on top of Cellframe Network. We believe that the next paradigm for blockchain technology is mass adoption and our platform strives to expand the use cases associated with blockchain technology. Cellframe can provide extremely high transaction throughput based on the original sharding implementation. In addition, Post-quantum cryptography makes the system resistant to hacking by quantum computers, which are not far off. Based on the original sharding implementation, Cellframe can provide extremely high transaction throughput. -
14
Google Cloud Key Management
Google
Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys. -
15
Aztec
Aztec
The new internet of money is secured by openness, but at a high price, all your counterparties know your entire financial history. Aztec is the ultimate security shield for the internet of money, protecting user and business data on Web3.0. With cryptographic anonymity, sender and recipient identities are hidden. Transaction amounts are encrypted, making your crypto balances private. Network observers can’t even see which asset or service a transaction belongs to. Aztec is built on PLONK, the new superfast standard in universal SNARK technology, created by our world-class cryptography team. Private transactions are computed in seconds on all devices, and our rollup service saves gas and settles in minutes. Fund and manage your DeFi positions anonymously, and trade them inside the Aztec privacy shield. Program private money, escrow, money streaming, micropayments, your imagination is the limit. -
16
BCSS
Prime Factors
BCSS reduces application development costs, simplifies retail payments security, and helps meet industry & regulatory compliance related to cryptography for applications that issue payment credentials and process electronic payments. BCSS simplifies working with payment HSMs and manages cryptographic keys to facilitate payment card issuance. BCSS also enforces role-based access controls, audit logging, and reporting to help banks and financial services around the world meet PCI compliance. BCSS software eliminates the need for enterprises to develop and maintain custom software code that incorporates the logical security and payment schemes required by payment network brands – saving time and money. BCSS is backed by a dedicated team of highly specialized payment security experts that can provide guidance, troubleshooting, and ongoing support for enterprises planning, implementing, or running custom payment applications.Starting Price: $0.00 -
17
Quantum Xchange
Quantum Xchange
Quantum Xchange is an industry leader in providing advanced cryptographic management solutions designed to safeguard data in motion against current and emerging cybersecurity threats, including those posed by quantum computing advancements. Their comprehensive platform addresses single points of failure in encryption, ensuring robust data security today and quantum-safe protection for the future. A key offering from Quantum Xchange is CipherInsights, a tool that enables organizations to discover, catalog, and prioritize cryptographic risks within their networks. This continuous monitoring facilitates proactive identification and remediation of vulnerabilities, thereby enhancing the organization's security posture. To further strengthen data protection, Phio TX provides an affordable, crypto-agile, and quantum-safe solution. It seamlessly integrates with existing IT infrastructures, enabling the deployment of post-quantum cryptographic algorithms without significant performance costs. -
18
Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.Starting Price: $0.0230 per month
-
19
Confidant
Confidant
Confidant is a open source secret management service that provides user-friendly storage and access to secrets in a secure way, from the developers at Lyft. Confidant solves the authentication chicken and egg problem by using AWS KMS and IAM to allow IAM roles to generate secure authentication tokens that can be verified by Confidant. Confidant also manages KMS grants for your IAM roles, which allows the IAM roles to generate tokens that can be used for service-to-service authentication, or to pass encrypted messages between services. Confidant stores secrets in an append-only way in DynamoDB, generating a unique KMS data key for every revision of every secret, using Fernet symmetric authenticated cryptography. Confidant provides an AngularJS web interface that allows end-users to easily manage secrets, the mappings of secrets to services and the history of changes. -
20
Labelmaster
Labelmaster
For more than five decades, Labelmaster has been the go-to source for companies, big and small, to navigate and comply with the complex, ever-changing regulations that govern dangerous goods and hazardous materials. From hazmat labels and UN-certified packaging, hazmat placards, and regulatory publications, to advanced technology and regulatory training, Labelmaster’s comprehensive offering of industry-leading software, products, and services helps customers remain compliant with all dangerous goods regulations, mitigate risk, and maintain smooth, safe operations. Labelmaster's dedication to supporting its customers' operational and compliance needs is enhanced through its unmatched industry expertise and consulting services, which serve as a valuable resource for customers to answer difficult and commonplace regulatory questions. Whether you're shipping hazardous materials by land, air, or sea, Labelmaster is your partner in keeping your business ahead of regulations. -
21
Lumi Wallet
Lumi Wallet
Lumi Wallet is a secure and trusted wallet for all your cryptocurrencies. Engineered with maximum security, Lumi Wallet protects cryptocurrency owners by using high-level encryption standards and advanced cryptography. Private keys are stored only on your device and no private data ever goes to servers. Lumi Wallet supports Bitcoin, Ethereum, EOS, BCH, and more than 1200 ERC20 tokens. We constantly review and add new coins according to the popular demand, credibility, and value of the digital asset. Transparency and decentralization are the key concepts of blockchain technology. By joining the open source movement and sharing our code with the crypto community we aim to demonstrate our commitment. You can check our code here. With Lumi Wallet sending and receiving cryptocurrency is fast and simple. Dynamic transaction fees are calculated automatically depending on the network load and transaction value but users are free to set their own fees if they wish so. -
22
Keybase
Zoom Communications
End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. You can set a timer on your most sensitive messages. -
23
CSRNG
CSRNG
CSRNG stands for “Cryptographically Secure Random Number Generator”. It says it all! Easy to use, well documented, fast and convenient, CSRNG Lite provides you with a NIST-certified random number generator that can provide your applications with the random numbers you need, be it for gambling apps, cryptography, secure codes, research, statistics, academics, and anywhere random numbers are needed. You can change the min and max values in the queried URL to change the scope of the number generator. For more intensive, live websites and custom needs, we offer a customizable API to which you can subscribe. All the CSRNG professional features, plus the possibility to store your random number requests for later use. We offer a query API that returns results in the exact format as the random number generator API so you can reuse stored numbers later. You can also ask for unique numbers in a certain scope, which is perfect for gambling websites, survey companies, and statisticians.Starting Price: $7 per month -
24
Unbound Crypto Asset Security Platform
Unbound Security
The only FIPS 140 L2 certified Multi-Party-computation (MPC) security platform for digital assets. With Unbound’s Crypto Asset Security Platform (CASP) you can define multi-party risk-based approval policies that adhere to local regulations, can integrate HSMs and offline signers into one MPC based platform. A FIPS 140 L2 certified software solution that eliminates this single point of failure of public-key cryptography by giving you a secure, distributed way to sign transactions while managing all your digital assets. With Unbound CASP, institutional investors don’t have to choose between regulatory adherence, peace of mind, and asset productivity. One comprehensive system that safeguards digital assets in both ‘cold’ and ‘hot’ vaults, while using MPC-based workflows and approval policies to secure the transfers between the two types of vaults. CASP supports any approval-policy structuring and any (unlimited) number of cryptographically validated signers. -
25
ZevaCrypt
ZevaCrypt
Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.Starting Price: $9.90 per month -
26
USDX Wallet
Lighthouse Blockchain Technology
USDX Wallet is a blockchain-based cryptowallet made for instant money transfers. It features USDX − a stable cryptocurrency pegged to the U.S. Dollar. Setting up an account in the wallet takes only a minute. And best of all, there are no fees for payments in USDX. The wallet’s security is implemented at multiple levels. The primary defense is asymmetric cryptography, which is an essential component of cryptocurrencies. Your private key is encrypted and stored safely; only you can decrypt it and perform transactions. The use of distributed ledger technology ensures that all transactions are irreversible. Moreover, your account is linked to your mobile phone number, preventing unauthorized access and enabling two-step authentication. Every transaction must be confirmed with a code from a push notification or SMS. Lastly, the app auto-locks after several minutes of inactivity and requires a PIN code, fingerprint or face scanning to unlock. -
27
Akeyless Identity Security Platform
Akeyless
Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight. -
28
SDS E-Business Server
Software Diversified Services
SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control. -
29
Radix UI
Radix UI
Radix UI is an open source component library optimized for fast development, easy maintenance, and accessibility. It offers two main packages, Radix Primitives and Radix Themes. Radix Primitives is a low-level UI component library focused on accessibility, customization, and developer experience. Components adhere to WAI-ARIA design patterns, are unstyled by default, and provide full keyboard navigation. Radix Themes is a pre-styled component library designed to work out of the box with minimal configuration. It includes layout primitives, typography, and components like buttons and cards, all customizable via the Theme component. Radix Colors offers a comprehensive, accessible color system for designing beautiful, accessible websites and apps. It supports automatic dark mode, transparent variants, and is designed for user interfaces. Radix Icons provides a crisp set of 15×15 icons available as individual React components.Starting Price: Free -
30
Tuta
Tuta
Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices. Tuta is committed to using renewable energy to power its servers, ensuring privacy while contributing to a greener future.Starting Price: €1.20 per month -
31
Pragma Fortress SSH Server
Pragma Systems Inc
Pragma Fortress SSH Server for Windows uses patent-pending technology to provide the most secure, reliable, full-featured and fastest Secure Shell (SSH) server and SFTP/SCP file transfer servers. By using Pragma's SSH Server and Client technologies, customers can deploy these secure file transfer and copy capabilities knowing the embedded Cryptographic Module has met the highest possible security standards. This ensures that your file transfers are protected by best-in-class security. • RFC 6187 compliant and can perform X.509 v3 CAC/PIV smart card access to Cisco routers and switches using RSA or ECC (Elliptic Curve Cryptography) certificates • FIPS 140-2 compliant using Microsoft NIST certificate #4536. SSH technology implemented on Microsoft Crypto built within Windows • SSH shell sessions that can run Microsoft PowerShell, cmd, Unix shells, etc. • Secure file transfer (SFTP/SCP) • Port Forwarding / Tunneling • Fully supports public key, x.509, smart cards, DoD CAC • IPv6Starting Price: $799 (unlimited connections) -
32
IDEMIA
IDEMIA
IDEMIA is a global leader in identity technologies, specializing in biometrics and cryptography to provide secure and seamless interactions in both physical and digital environments. The company offers solutions across various sectors, including payment, connectivity, access control, public security, and travel, enabling secure transactions and identity verification for citizens and consumers worldwide. IDEMIA serves more than 600 government organizations and 2,400 enterprises, including some of the world's most influential brands. IDEMIA's mission is to unlock the world and make it safer by ensuring secure and trusted identities for all. Explore the innovation trends streamlining and securing interactions between people, objects, companies, governments, and everything in between, in the physical and digital worlds. And while connections and transactions are increasingly streamlined and seemingly effortless, we tap into cryptography expertise and leadership to ensure they are safe.Starting Price: Free -
33
EncryptRIGHT
Prime Factors
EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.Starting Price: $0 -
34
UBIRCH
UBIRCH
UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source. One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library. -
35
IBM Guardium Quantum Safe, delivered on the IBM Guardium Data Security Center, monitors, uncovers, and prioritizes cryptographic vulnerabilities to help protect your data from both conventional and quantum-enabled risks. As quantum computing advances, traditional encryption algorithms that would take centuries to break using conventional computers may be cracked within hours, potentially leaving all sensitive information secured by today's encryption standards vulnerable. IBM, a leader in the quantum-safe space, developed two recently published NIST post-quantum cryptographic standards in collaboration with industry partners. Guardium Quantum Safe provides comprehensive, consolidated visibility into your organization’s cryptographic posture, vulnerabilities, and remediation progress. Users can define and run policies based on internal security policies and external regulations, integrating with enterprise issue-tracking tools to accelerate compliance.
-
36
Enigma Vault
Enigma Vault
Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. Enigma Vault provides the following services. Enigma Vault takes the mess out of crypto and PCI compliance. You no longer have to manage and rotate private keys nor deal with complex cryptography. -
37
J-KMS
JISA Softech
JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format. -
38
Analog
Analog
The Timechain operates as a permissionless network with a dynamic group of validators, also known as time nodes, that implement the nominated Proof-of-Stake (NPoS) consensus algorithm and, later, Proof-of-Time (PoT) protocol. Participation in securing the network is open to anyone who has attained a ranking score and staked some $ANLOG tokens. Analog Network derives its security from threshold cryptography, novel consensus protocol, and validator observers (sentinels) — with validator security rules, rigorous audits, and bug bounties. You can customize your dApp’s security settings, such as the number of chronicle workers participating in threshold cryptography, as needed. Analog Network provides a unified API — called the Watch API — that brings visibility to data from any connected blockchain through an intuitive and easy-to-use interface. Use the Watch SDK and streamlined API to quickly build and scale your cross-chain apps. -
39
WS_FTP
Progress
WS_FTP Professional is the safest and easiest way to upload and download files. It provides SFTP transfers with the highest levels of encryption, is easy to use and customize, and reduces administrative burden. Protect files before, during, and after transfer with 256-bit AES, FIPS 140-2 validated cryptography and OpenPGP file encryption. Use SFTP to authenticate and connect to servers that require SSH clients that respond to server-defined prompts for authentication, in addition to username. Easily locate and transfer files using integrated Google™, Copernic™ or Windows® desktop search engines. Search by parameters such as file type, size, and date. Use this SFTP client to instantly connect to multiple servers. Drag-and-drop to move any size and type of files between your computer and a remote server, or from one server to another. A customizable display, drag-and-drop functionality and numerous time-saving features make our FTP client incredibly easy to operate.Starting Price: $29.95/one-time -
40
Safsheets
Safsheets
Safsheets is an AI-powered Hazmat Compliance Assistant for Amazon sellers. It analyzes Product Detail Page (PDP) and Safety Data Sheet (SDS) to detect missing info, inconsistencies, and dangerous goods signals that Amazon bots flag during hazmat reviews, and generate detailed PDP and SDS analysis reports, to help sellers prevent costly listing suspensions, “unable to classify” delays, inventory destruction, and lost sales. Combining regulatory knowledge and AI reasoning, it provides actionable advice to fix issues before Amazon flags a product—saving sellers time, money, and headaches. -
41
Confide
Confide
Confide uses industry-standard end-to-end encryption to keep your messages safe and to ensure they can only be read by the intended recipients. Messages disappear forever after they are read once, making them as private and secure as the spoken word. Confide’s patented ScreenShield technology keeps your communication safe by preventing screenshots of your messages. Confide utilizes industry-standard cryptography to keep your messages safe and secure. We combine this with a simple and intuitive user experience to provide superior security, with no configuration required. All messages between Confide users are end-to-end encrypted. Encryption keys are generated locally on each device and the private key never leaves the device, ensuring that only the intended recipients can read your messages. All communication goes through Transport Layer Security (TLS), preventing any possible man-in-the-middle attack and providing yet another layer of security, privacy, and data integrity.Starting Price: $4.99 per user per month -
42
Quantum Origin
Quantinuum
Experience the world’s only quantum-computing-hardened encryption keys, ensuring provably superior protection and allowing you to seamlessly strengthen your existing cybersecurity systems for enhanced security today, and into the future. Every organization owns sensitive data that must be kept secret at all costs. Quantum Origin adds unmatched cryptographic strength to existing cybersecurity systems, giving your enterprise a long-term edge against cyber criminals. Maintaining the trust of customers, shareholders, and regulators means adapting and strengthening your cybersecurity foundations. Adopting Quantum Origin showcases your commitment to staying ahead of potential threats. Quantum Origin verifiably strengthens the cryptographic protection around your technology and services, proving you take the privacy and security of your customer's data as seriously as they do. Let your customers know their data is safe with the ultimate in cryptographic protection. -
43
SIGNiX
SIGNiX
The patented SIGNiX digital signature platform provides enhanced security and seamless integration with software partners serving highly regulated industries like real estate, wealth management, government, and healthcare. SIGNiX allows partners to offer the military-grade cryptography, enhanced data privacy, and permanent legal evidence of a true digital signature without the costs, delays, or risks that attend paper-based workflows. The SIGNiX digital signature is available via FLEX API, a powerful, 100% white-label ready API that enables partners to seamlessly integrate a true digital signature into existing products. SIGNiX also offers MyDoX, a standalone digital signature solution for resellers and vendors. In both cases, complex cryptography and enhanced security measures are completely abstracted from the user’s view, providing a simple, friendly user experience.Starting Price: $120/yr -
44
NordLocker
Nord Security
Leading-edge encryption at your fingertips. We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords. Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients.Starting Price: $1.49 per month -
45
Hushmesh
Hushmesh
Identity theft is a consequence of the disjointed, domain-centric architecture of the Web. Without a global unified namespace, the Web requires each domain to manage identity independently. This “every domain for itself” model makes global identity security impossible. In contrast, the cryptographic namespace of the Mesh enables the creation of individual keychains for each person and non-person entity. Domains can then lock their users’ accounts with unique keys on their users’ keychains. Data breaches are symptoms of the domain-centric data security model of the Web. Without built-in cryptographic security at the person or non-person entity level, the Web requires each domain to secure data on its own. This approach increases the global attack surface and puts “domain insiders in the middle”, creating vulnerabilities and liability along with it. -
46
Cryptomathic CKMS
Cryptomathic
Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions. -
47
The Entrust Cryptographic Security Platform is a unified, end-to-end solution designed to manage cryptographic assets, including keys, secrets, and certificates, across diverse enterprise environments. It offers centralized visibility through a unified dashboard, enabling organizations to monitor cryptographic assets, audit changes, and receive alerts for enhanced security oversight. It supports scalable deployment with high-performance cryptographic solutions, ensuring compliance with regulatory standards and providing future-proof protection against emerging threats. Features include automated certificate lifecycle management, robust key and secrets management, and integration with hardware security modules for secure key storage and cryptographic operations. Additionally, the platform facilitates interoperability with existing IT and security infrastructures through extensive integrations and open APIs.
-
48
CertifyMe
CertifyMe
CertifyMe helps trainers, teachers, event marketers, and HR professionals award cryptographic digital certificates and badges with just a couple of clicks. Our systems are built keeping a security-first mindset. Our encryption algorithms and access/ authentication techniques are state-of-the-art to ensure maximum security and privacy for your credentials. Our immutable crypto credentials use advanced technologies like the AWS Quantum ledgers to ensure your credentials are secure. Our 40+ feature set also includes advanced options like cryptographic signatures based on RSA SHA-1, Id tagging, barcodes, and Qrcode to name a few. Stand out, and deploy your own digital credential platform in your domain using our white-labeled solutions starting at $50. Your credential systems would run on our dedicated servers ensuring a high level of security & customizability. We also provide API and Zapier integration.Starting Price: $15 per month -
49
Alliance Key Manager
Townsend Security
Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.Starting Price: $4,800 one-time payment -
50
xtendr
xtendr
xtendr unhides detailed, privacy-preserving insights across multiple independent data sources. xtendr enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. xtendr is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance.