getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software - Page 5

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


123 software options

strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Socializer Messenger logo

Highly encrypted solution for internal communication

learn more
A messaging solution for companies and governments that places a high value on privacy and security. In addition to all the features known from established messaging solutions, it offers unique privacy features under the highest level of encryption to address often overlooked security gaps.

Read more about Socializer Messenger

Users also considered
LAN Crypt File and Folder Encryption logo

Designed for businesses of all sizes and all in industries.

learn more
u.trust LAN Crypt protects your confidential files against unauthorized external or internal access.

Furthermore, u.trust LAN Crypt uses a strict role split approach: The network administrator can access and
manage files and the security officer manages keys and security policies.

Read more about LAN Crypt File and Folder Encryption

Users also considered
MySecureFolder logo

File encryption & folder lock for Windows

learn more
My Secure Folder by Magnyte is a folder lock and file encryption software for Windows that protects sensitive data using AES-256-GCM encryption. The software combines dual-layer security through Wi-Fi network verification and password protection, with features including automatic backups, activity logging, and configurable auto-lock protection based on inactivity timeouts.

Read more about MySecureFolder

Users also considered
Flowvault logo

Encrypted notepad with hidden notebooks

learn more
Flowvault is a zero-knowledge encrypted online notepad that allows multiple passwords to unlock different notebooks on the same URL. The platform features Argon2id password hashing, AES-256-GCM authenticated encryption, and plausible deniability through hidden volumes. It offers multi-notebook tabs, self-destructing encrypted messages, time-locked notes, and encrypted backup and restore capabilities without requiring an account.

Read more about Flowvault

Users also considered
Xecrets Ez logo

Encryption software for macOS, Linux, and Windows

learn more
Xecrets Ez is a free, cross-platform desktop app for Windows, macOS, and Linux. It offers AES-256 file encryption, a simple UI, and secure deletion of originals. Works fully offline, with optional premium features like YubiKey support and Shamir’s Secret Sharing.

Read more about Xecrets Ez

Users also considered
Zoho ToDo logo

Application for creating, tracking, and managing tasks

learn more
Zoho ToDo is a task management tool designed to help businesses create and manage tasks. With Zoho ToDo, you can effortlessly organize, collaborate, and track your tasks via a unified portal. Whether you're working on personal projects or collaborating with a team, the application provides a streamlined workflow that helps you stay on top of your tasks.

Read more about Zoho ToDo

Users also considered
Klarytee logo

Data-centric Governance Platform.

learn more
Data-centric Governance Platform. Visibility. Protection. Control. For AI & Beyond.

Read more about Klarytee

Users also considered
OpenText Data Privacy and Protection logo

Data privacy and protection portfolio

learn more
Voltage is a data privacy and protection portfolio that can be used for data privacy readiness, secure collaboration, structured data optimization, and other use cases. It offers solutions for file analysis, sensitive data management, encrypted email, and more.

Read more about OpenText Data Privacy and Protection

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
MeSign logo

End-to-End encryption and digital signature app for emails.

learn more
Provides email encryption, digital signing and timestamping service for your corporate emails.

Auto-configure email certificates, encrypt email message automatically by default with S/MIME standard.

Cloud and on-premise key management are both supported.

Read more about MeSign

Users also considered
Confidencial logo

Cloud-based data protection and security solution

learn more
Confidencial is a document security solution that enables users to protect sensitive data with granular encryption controls.

Read more about Confidencial

Users also considered
FTAPI logo

Secure and automate your sensitive data.

learn more
FTAPI, a Munich-based software specialist, offers a comprehensive platform for easy and secure data workflows and automation. Using leading encryption technologies, these workflows are protected at all times - whether it concerns sending or receiving data, structured data input, sharing confidential

Read more about FTAPI

Users also considered
Symantec Encryption logo

Data encryption tool for protecting sensitive data

learn more
Symantec Encryption is a comprehensive solution designed to help organizations protect their sensitive data at rest or in transit. With its advanced encryption capabilities, Symantec Encryption can help organizations prepare for assumed breaches and mitigate the risk of data loss or theft. The solution provides a range of capabilities, including endpoint encryption, email encryption, file and folder encryption, data exchange encryption, and key management.

Read more about Symantec Encryption

Users also considered
Guardium Data Security Center logo

Comprehensive data security solution

learn more
IBM Guardium Data Security Center is a comprehensive solution that protects your data from current and emerging risks, including AI and cryptographic attacks. It offers a unified experience for security teams to collaborate, manage vulnerabilities, and streamline compliance. The product covers the full data security lifecycle, from discovery to remediation, across on-premises and cloud environments, structured and unstructured data.

Read more about Guardium Data Security Center

Users also considered
TDAccess logo

Encryption software

learn more
Latest cross-platform compression and transmission capabilities that meets (FIPS) 140-2 requirements.

Read more about TDAccess

Users also considered
PrivMX Fusion logo

Collaboration software with zero-knowledge encryption

learn more
All-in-one, privacy-by-design collaboration software for all kinds of teams, with virtual workspace protected by zero-knowledge encryption. It helps teams organise and manage daily tasks, files and communication in a fresh new way, making it easier to focus and stay goal-oriented.

Read more about PrivMX Fusion

Users also considered
Proton Drive logo

Encrypted cloud storage and collaboration tools for teams

learn more
Keep your business data truly private with Proton Drive's zero-access, end-to-end encryption across all files, documents, and spreadsheets. Built on open-source, independently audited code and ISO 27001 certified.

Read more about Proton Drive

Users also considered
Data Krypter logo

On-premise encryption software

learn more
Data Krypter is an encryption software that protects data by encrypting files, folders, and text.

Read more about Data Krypter

Users also considered
CenterDevice logo

Software for the secure management of sensitive documents.

learn more
CenterDevice is software for document management, which enables the secure management of sensitive documents in accordance with GDPR, GoBD, and C5 guidelines. For this purpose, users can access various functions to archive, exchange, and manage documents.

Read more about CenterDevice

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
CipherTrust Cloud Key Manager logo

Key Management Solution

learn more
Cloud-based solution that provides authentication and encryption services across any application or device.

Read more about CipherTrust Cloud Key Manager

Users also considered
CipherTrust Data Security Platform logo

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered