G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Data Encryption with BestCrypt BestCrypt by Jetico delivers speed, flexibility and confidentiality for anyone concerned with protecting sensitive information – from IT experts at large organizations
CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.
KodeFile is a key-on-demand encryption software solution. With a few clicks, encrypt your files and share the encryption keys. KodeFile generates, stores and shares the encryption keys for you!
miniLock is a simple solution for encrypting and sharing files.
ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption) reduces the cost of deploying, managing, and troubleshooting encrypted laptops and desktops.
Peacemakr is the Twilio for end-to-end encryption. Details: We control access in the physical world with locks; we control it in the digital world with Peacemakr. You might have given someone you tr
A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin
Privacera, based in Fremont, CA, was founded in 2016 by the creators of Apache Ranger™ and Apache Atlas. Delivering trusted and timely access to data consumers, Privacera provides data privacy, securi
Bulletproof Privacy. Certified for classified government use. The most advanced encrypted communication application for smartphones, PRIVUS SecurLine features HYPERSECURE™ privacy technology, develop
qProtect is a unique for data in uncontrolled environments, protecting it even in the event of theft or loss. It offers a much-needed practical solution for the protection of critical mobile data.
Smart Chat ++ is an all-in-one platform for team collaboration, designed for secure messaging.
With SmartCryptor you can encrypt your data and store it securely on desktop or cloud storage applications. Share your files or revoke access to any shared documents anytime, using any device. You hav
The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery and classification, protection (encryption, tokenization & k
Threema OnPrem is the business messaging solution for companies and organizations that don’t compromise on data privacy and security. The combination of total data ownership and Threema’s proven secur
A Key Part of Fortra (the new face of HelpSystems) Titus is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing co
Vaultree fully encrypts data client side and allows for real-time scalable data processing and computations.
Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infr
1LimX was born to solve these problems: 100% Secure & Private From setting up master password, master key to encrypting/decrypting with ChaCha20-Poly1305 algorithm and storing data, all are happe
Aft India offers copy protection software and duplication solutions, USB Flash Drives, Video data file encryption, Software security protection, USB Dongles, Downloads, CD/DVD copy protection & CD
Send highly confidential data fully end-to-end encrypted without leaving traces. Your data is encrypted in your browser and remains encrypted until its destination. Send even large files or entire fo
Atakama Inc. is an information security software company that provides military-grade, file-level encryption. By using Atakama, enterprises prevent data exfiltration, enhance regulatory compliance, se
BBM ® Enterprise offers secure text, voice, video, group chat and conferencing on any device, including smartphones and desktops. It’s the ideal communications solution for businesses and working pr
BlindHash Cyber's patented technology offers a new way to think about securing passwords. Until now, the more secure the password the slower the login process along with an expensive pricetag for secu
Bouncy Castle is a collection of APIs used in cryptography.
BoxyHQ offers a comprehensive suite of APIs tailored for security, privacy, and enterprise compliance needs. Our user-friendly No/Low code solutions empower engineering teams to accelerate the develop
Challenger is offered to encrypt at a data and directory level and is ideal for all security aware users, especially in areas such as patent development, development engineers, journalists, lawyers an
CipherStash is the ultimate in data security. Our products use advanced queryable encryption technology that keeps data encrypted-in-use, rather than just at-rest. This ensures that access controls ar
Cloaked Search encrypts sensitive data before it goes to a search service. Only those with the correct key can search over the data. To unauthorized users without the key, including cloud platform adm
Next-Generation Intelligent Computing Cornami’s break-through software-defined TruStream® computing architecture can scale performance without penalties to deliver real-time computing for several cri
Across industries, we help data-driven companies to lower the risk of manipulating sensitive data.
CoSMo Software We resolve intractable Real Time Communication problems for the world’s top tech and media companies and we stream the world’s fastest media
CrococryptLib for Java and Android: The easiest way to integrate encryption into enterprise applications.
Global industry leader in copy protection & license management solutions, assisting clients like Caterpillar, Honeywell, Nokia & thousands more in 60+ countries
Cryptainer Enterprise Encryption software uses strong Blowfish at 448 bits and AES at 256 bits. Cryptainer Enterprise has all the functionality of Cryptainer, plus an additional administrative module
ENCRYPT ANY DATA, ANY DISK, FILES AND FOLDERS ON ANY WINDOWS PC USING CRYPTAINER PE ENCRYPTION SOFTWARE
Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro Encryption Soft
Cryptainer SE provides network wide encryption based security implementation, using the existing hardware and software infrastructure of the enterprise.
Cryptomathic helps businesses and governments to deliver trust and confidence in the digital world. We’ve mastered the science of encryption so you can focus on the art of delivering beautiful digital
DataStealth is the ultimate data-centric defense platform in the event of a malicious insider, perimeter, or endpoint compromise. Instead of relying on protecting your network perimeter, DataStealth p
DESwrap software is designed to give instant protection to .EXE and .DLL files.
Difenso offers major groups, small companies and individuals an innovative and uniquely designed solution, easy to implement to protect all shared data.
A Digital Signature Certificate (DSC) is a widely used digital tool for the digital document signing process and storing essential data. Many government departments and service sectors have relied on
DQ0 is a platform for Ethical AI and Trustworty Analytics. It guarantees the protection of your data through Differential Privacy. You maintain complete control over your data and anybody can use it f
E-Lock is a pioneer in the field of PKI-based digital signature solutions with many well known customers across the globe. Be it a large enterprise, a small business, or an individual looking for reli
Encrypto lets you encrypt files before sending them to friends or coworkers. Drop a file into Encrypto, set a password, and then send it with added security.
KAPALYA empowers organizations and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application. This ubiqu
Entropy Keycrypt ensures a seamless and secure transition of your valuable information to your trusted circle in unforeseen circumstances.
Enveil's ZeroReveal products protect Data in Use, ensuring that nothing is ever revealed during the entire processing lifecycle.
FinalCode provides comprehensive file security that works throughout the file lifecycle and within an enterprise's existing file sharing infrastructure and applications.
FinalCode' persistent file security platform protects your CAD information no matter how files are shared inside and outside of your organization. The platform lets organizations, engineers, and desig
Capnion’s unique protocol is called Ghost PII and it focuses on personally identifiable information (or PII) like name, address, etc. Replace the PII in your pipelines now with encrypted data that, l
Confidential Computing Protect data in-use with Confidential VMs, Confidential GKE, Confidential Dataflow, Confidential Dataproc, and Confidential Space.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.
Secure your confidential files and folders. Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can pass
Post-Quantum is the leading business developing protection against the quantum threat and offering a range of unique commercial and government solutions.
Easily share sensitive information with co-workers, clients, friends and family.
InvisibleSecrets encrypts data and files and keeps them safe for secure transfer in emails or across the internet. The file encryption lets users encrypt and hide files directly from Windows Explorer
The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world
iScramble is a PHP script that allows you to protect sections of your HTML code from prying eyes. It scrambles the text into a form that is not human readable, and generates some JavaScript code to de
CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure
Kindite opens up the cloud for enterprises and regulated organizations, overcoming risks of privacy, compliance and control using disruptive encryption technology.
Kruptos 2 Software., a global leader in cross-platform data protection solutions, makes it simple for businesses, governments, and individuals to use and protect their most sensitive important data wh
Kryptel is file encryption software designed for reliable protection of sensitive data.
LifeReady is the platform to aggregate, curate and encrypt critical information using proprietary KeyCrypt™ technology to ensure your information is secure. We empower individuals, professional accoun
LIKEY is a robustly secured mobile keypad designed to safeguard user information by creating one-time generated keypad while guaranteeing the convenience of server management. LIKEY also allows flexib
Lorica enables private AI through end-to-end encrypted data processing, empowering organizations to leverage advanced AI
Secured browser extension to protect your digital footprints. Lynx assists analysts in maintaining a secure and efficient investigation. It provides a safe, isolated browsing environment while enhanc
MacSonik PDF Encryption Tool for Mac is an ideal tool to protect the unprotected PDF file to ensure the security of it. This software helps the users if they want to limit the number of other users wh
By bringing the amazing decentralized application ecosystem onto traditional social networks, the Mask extension provides a decentralized option for features Web 2.0 users are familiar with. Users cou
Uses encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.
NewSoftwares LLC is committed to providing strong, effective solutions in information security to its immediate customers and long-term partners & clients. We are constantly engaged in research an
Quantum Key Distribution, or QKD, is one kind of quantum cryptography protocol. It harnesses the fundamental uncertainty of quantum particles such as photons to encode information into them to produce
Micro Focus SecureData Payments is a secure payment solution for retail transactions designed to provide complete point-to-point encryption, tokenization and data security.
SmartCipher simplifies unstructured data security. With its centralized, policy-driven controls for data privacy, it delivers control over the use and proliferation of sensitive files for secure colla
Quick, secure PCI compliance, and much more. As easy as an API. Tokenization, data governance and access control, customer key management, fully customizable data schemas, REST and SQL APIs. Runs in
will encrypt your data fast and securely!
Phalanx stops cyber threats at the human layer with Zero Trust Data Security. Human error and productivity shortcuts increase cyber risk and data loss. Phalanx pairs firsthand security experience with
Accelerate your speed of innovation while ensuring data privacy, security and compliance. As easy as an API. Fast to implement, endlessly customizable, and ready to help you solve the biggest data pri
At Privitar, we are all about helping our clients maximize their innovation capabilities through the use of safe data for analytics. Privitar has been helping customers around the globe increase the
Bringing in the freedom to have military grade encryption for everyone in Web 3.0 by acting as a medium of encryption in exchange of almost all digital data with ULTIMATE ARMOR USER DATA PROTECTION th
QuDEFENSE is a secure file transfer solution designed for organizations that cannot afford data compromise—today or in the quantum future. Using Post-Quantum Cryptography (PQC) and blockchain-backed p
Randamu delivers decentralized cryptographic infrastructure that powers the next generation of secure, verifiable, and automated digital systems. Serving Web3 developers, protocols, and blockchains, R