getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software - Page 4

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


123 software options

Hushmail logo

Email, web form, and e-signature solution for healthcare

learn more
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.

Read more about Hushmail

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
OpenText™ Core Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
TunnelBear logo

Virtual Private Network Service Solution

learn more
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.

Read more about TunnelBear

Users also considered
Intercept X Endpoint logo

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Proton Mail logo

Web-based email management platform

learn more
ProtonMail is a web-based email management platform that helps businesses securely transmit encrypted emails between users both inside and outside of the organisation.

Read more about Proton Mail

Users also considered
PureVPN logo

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
Passportal logo

Encrypted cloud-based, automated password protection

learn more
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities

Read more about Passportal

Users also considered
Hotspot Shield VPN logo

Public virtual private network

learn more
Hotspot Shield is a private VPN that provides secure and private internet access by encrypting personal browsing information. Securely browse and stream videos, games, shows, sports, and movies anywhere in HD quality.

Read more about Hotspot Shield VPN

Users also considered
HMA logo

Virtual private network software for securing online traffic

learn more
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.

Read more about HMA

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
Progress ShareFile logo

Secure file sharing and sync

learn more
Progress ShareFile provides users with the ability to send, receive and share large business files securely. Through the ShareFile portal, offer clients a personalized, company-branded and password-protected platform from which to collaborate on files.

Read more about Progress ShareFile

Users also considered
Carbonite logo

Internet based backup solution

learn more
Carbonite lets users backup all the data on their computer as long as it’s connected to the internet. It is a cybersecurity software that allows businesses to back up their files and digital assets, as well as recover them in the event of a data loss.

Read more about Carbonite

Users also considered
Citrix Workspace logo

Digital workspace & workflow management platform

learn more
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.

Read more about Citrix Workspace

Users also considered
Symantec Endpoint Security logo

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
eM Client logo

Email, calendar, contacts, tasks, notes and chat in one app

learn more
eM Client is a powerful email client with a clean and easy-to-use interface, which supports PGP and S/MIME encryption and digital signatures. Upload and lookup GPG keys on eM Keybook, Proton and keys.openpgp.org. Password-protected startup. eM Client easily connects to any email service.

Read more about eM Client

Users also considered
DigiSecret logo

DigiSecret: the invisible encryption.

learn more
DigiSecret is a powerful Windows tool for securing sensitive data. It encrypts your documents and hides them within ordinary images using steganography, all while operating offline.

Read more about DigiSecret

Users also considered
Basis Theory logo

A compliant platform to secure, use, and manage your data

learn more
A compliant and developer-friendly platform to secure, use, and manage the data that matters most to you.

Read more about Basis Theory

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
iQ.Suite aaS logo

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
CyberGrant logo

AI-powered and Zero Trust Secure File Sharing & Encryption

learn more
CyberGrant’s FileGrant protects sensitive data with Zero Trust file sharing, persistent encryption, and private AI classification. Files stay encrypted and controlled even after download, ensuring secure collaboration across cloud, on-prem, hybrid environments, and external partners.

Read more about CyberGrant

Users also considered
TeraCryption logo

Tool that offers file security for HIPAA and CMMC compliance

learn more
TeraCryption is a file encryption management system that helps businesses protect sensitive files and control access to information to achieve HIPAA and CMMC compliance.

Read more about TeraCryption

Users also considered
WorkBot logo

Encryption solution

learn more
AI-powered chatbot, chat agent, and voice agent that automate support, engage users, and boost business efficiency.

Read more about WorkBot

Users also considered
InPrivy logo

Share and receive sensitive information across the web.

learn more
InPrivy helps businesses share and receive passwords and other sensitive information and secure confidential data. Key features include custom branding and domain, public sharing URL, password protection, and team management.

Read more about InPrivy

Users also considered
ANKASecure logo

Quantum-safe encryption for enterprise data

learn more
ANKASecure is encryption software protecting enterprise data from quantum threats using certified post-quantum algorithms. It offers quantum-resilient encryption with NIST certification, flexible deployment via CLI, API, and SaaS, and supports migration from RSA and ECC. Features include cryptographic sovereignty with full key control, crypto-agility for adaptable algorithms, and centralized key management.

Read more about ANKASecure

Users also considered