getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software with Encryption (2026) - Page 3

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


83 software options

Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
BlueFiles logo

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
Kloudle logo

Automated Cloud Security for growing engineering teams

learn more
Kloudle automates the critical steps required for public cloud infrastructure. Engineers who use public cloud infra for their work get instant security capabilities.

Kloudle builds and maintains inventory, finds security misconfigs, and gives detailed steps to fix them.

Read more about Kloudle

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
heylogin logo

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Netwrix Endpoint Protector logo

Data loss prevention and endpoint protection tool

learn more
Netwrix Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.

Read more about Netwrix Endpoint Protector

Users also considered
CipherCloud logo

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
AdsPower logo

Anti-detection browser for multi-account eCommerce marketing

learn more
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints.

Read more about AdsPower

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

learn more
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
ISS logo

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
Ryn VPN logo

VPN solution for data security.

learn more
Ryn VPN is a VPN solution that helps businesses encrypt data and connect to any app or website securely. The platform enables users to hide their IP address and protect identity while browsing the web to unlock any websites and apps. The strict no-logs policy ensures that none of the details are revealed to third parties. Additionally, Ryn VPN helps users bypass geo-restrictions and access all contents from anywhere. The solution is designed for Android phones or iOS devices.

Read more about Ryn VPN

Users also considered
Rzilient logo

IT management solution

learn more
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management.

Read more about Rzilient

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
RestoreX360 logo

Windows Repair Tool

learn more
RestoreX360 is an all-in-one software solution designed to help users maintain, repair, and optimize Windows operating systems. With its comprehensive toolkit, RestoreX360 targets a range of common system issues and provides solutions to maintain performance, system stability, and overall user experience.

Read more about RestoreX360

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE offers cellular SD-WAN and cybersecurity in an easily managed platform designed for agile businesses with small IT teams. It enables rapid network setup, integrates advanced zero trust security tools, and supports 4/5G traffic steering and network slicing capabilities.

Read more about Ericsson NetCloud Manager

Users also considered
Clearswift SECURE Email Gateway logo

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered