App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Encryption Software

121 software options

Sponsored

Personalize your search

Any industry

Any business size

Trustifi logo
4.8
(4)

Protect Your Business Emails with AI-Powered Security

visit website
Email security solution that helps manage threat detection, regulatory compliance, data encryption, whitelisting/blacklisting, and more.

Read more about Trustifi

Users also considered
ESET Endpoint Security logo
4.7
(1.1K)

Network security, network monitoring & endpoint protection

visit website
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
SecureDoc Disk Encryption logo
(0)

Full-disk encryption for enterprises

visit website
SecureDoc ensures data security with easy installation, robust encryption and diverse authentication options, effortlessly meeting various compliance requirements. Protect your personal data effectively with SecureDoc's comprehensive features.

Read more about SecureDoc Disk Encryption

Users also considered
Virtru logo
4.6
(37)

DATA SHARING, PRIVACY, AND INNOVATION. SECURED.

visit website
Virtru offers a range of data protection products that provide encryption, access controls, key management, and persistent audit to meet security and privacy needs. Supports HIPAA, GDPR, CCPA, ITAR, CJIS, NIST, FERPA and CCMC compliance & integrates seamlessly into the platforms you already use.

Read more about Virtru

Users also considered
Baffle logo
(0)

Cloud-based data protection software

visit website
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
AxCrypt logo
4.9
(19)

AxCrypt, File encryption software, Password manager

visit website
AxCrypt is a file encryption software that provides secure data storage and sharing. AxCrypt is designed to be user-friendly while maintaining a high level of encryption for sensitive information.

Read more about AxCrypt

Users also considered
UTunnel VPN logo
5.0
(68)

Cloud VPN, Zero Trust Network Access, and Mesh Networking

visit website
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
1Password logo
4.7
(2K)

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
MySQL logo
4.6
(2K)

One database service for transactions, analytics, and ML

learn more
MySQL is a relational database management system (RDBMS) designed to help businesses record, update, and manage data and deploy cloud-native applications. Features include data masking and de-identification, multi-document transaction support, intrusion detection, alerts & configuration management.

Read more about MySQL

Users also considered
Cloudflare logo
4.8
(442)

Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare

Users also considered
Keeper Security logo
4.7
(480)

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
TunnelBear logo
4.5
(461)

Virtual Private Network Service Solution

learn more
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.

Read more about TunnelBear

Users also considered
Symantec Endpoint Security logo
4.4
(543)

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

learn more
Two-way TLS authentication and encryption to third-party assessments and independent audits (e.g. Type 1 SOC)

Read more about JumpCloud Directory Platform

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Web Security Layer

Read more about WebTitan

Users also considered
Bitdefender GravityZone logo
4.6
(208)

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
CrashPlan logo
4.5
(245)

Easy, automatic cloud business backup

learn more
Code42's CrashPlan for Small Business is a global enterprise SaaS provider of endpoint data protection and security. Backup, restore and protect your data from anywhere with CrashPlan for Small Business.

Read more about CrashPlan

Users also considered
Bitwarden logo
4.7
(161)

The Most Trusted Open Source Password Manager for Business

learn more
Bitwarden is an open source password manager that uses end-to-end encryption to enable users to securely store and share sensitive data.

Read more about Bitwarden

Users also considered
Webroot Business Endpoint Protection logo
4.5
(212)

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Users also considered
Intercept X Endpoint logo
4.5
(214)

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
GoAnywhere MFT logo
4.8
(125)

Managed File Transfer to secure and automate data exchanges.

learn more
Fortra's GoAnywhere helps to encrypt enterprise files transfers and meet compliance requirements. Request a free demo today.

Read more about GoAnywhere MFT

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess creates a secure network infrastructure that hides your business systems, assets and resources from the internet. In 10 minutes you create a private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Cypherdog Encryption logo
4.8
(102)

One click. Complete protection.

learn more
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.

No "trusted" third party, zero-knowledge security model, asymmetric encryption.

Read more about Cypherdog Encryption

Users also considered
MOVEit logo
4.7
(93)

Secure data & file transfer for enterprise-level users

learn more
MOVEit Managed File Transfer (MFT) software provides secure collaboration and automated file transfers of sensitive data. Organizations get complete visibility of all file transfers along with automated workflows that can replace scripting.

Read more about MOVEit

Users also considered