getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software - Page 2

Last updated: April 2026

122 software options

Enterprise Security logo

Enterprise security and data protection system

learn more
Enterprise Security offers a data protection system that protects sensitive data anywhere and everywhere, empowering organizations to use data to create better customer experiences, make intelligent decisions, and fuel innovation. Protegrity’s fine-grain data protection solutions can enable your data security, sharing, and analytics.

Read more about Enterprise Security

Users also considered
InPrivy logo

Share and receive sensitive information across the web.

learn more
InPrivy helps businesses share and receive passwords and other sensitive information and secure confidential data. Key features include custom branding and domain, public sharing URL, password protection, and team management.

Read more about InPrivy

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
TeraCryption logo

Tool that offers file security for HIPAA and CMMC compliance

learn more
TeraCryption is a file encryption management system that helps businesses protect sensitive files and control access to information to achieve HIPAA and CMMC compliance.

Read more about TeraCryption

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
Xecrets Ez logo

Encryption software for macOS, Linux, and Windows

learn more
Xecrets Ez is a free, cross-platform desktop app for Windows, macOS, and Linux. It offers AES-256 file encryption, a simple UI, and secure deletion of originals. Works fully offline, with optional premium features like YubiKey support and Shamir’s Secret Sharing.

Read more about Xecrets Ez

Users also considered
CipherTrust Data Security Platform logo

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
CipherTrust Cloud Key Manager logo

Key Management Solution

learn more
Cloud-based solution that provides authentication and encryption services across any application or device.

Read more about CipherTrust Cloud Key Manager

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock is a cloud-based software that helps with encryption of all information and protection against unauthorized access.

Read more about DriveLock

Users also considered
MongoDB logo

Database management and application development software

learn more
AI demands adaptability. MongoDB offers flexible, scalable, AI-ready data solutions, eliminating friction and accelerating innovation.

Read more about MongoDB

Users also considered
Dhound logo

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
Zoho ToDo logo

Application for creating, tracking, and managing tasks

learn more
Zoho ToDo is a task management tool designed to help businesses create and manage tasks. With Zoho ToDo, you can effortlessly organize, collaborate, and track your tasks via a unified portal. Whether you're working on personal projects or collaborating with a team, the application provides a streamlined workflow that helps you stay on top of your tasks.

Read more about Zoho ToDo

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.

Read more about NordLayer

Users also considered
WinZip logo

File encryption and management solution

learn more
WinZip is an encryption software that offers file compression and management solutions. With WinZip, users can compress, decompress, encrypt, and share files, enhancing productivity and streamlining file organization.

Read more about WinZip

Users also considered
Carbonite logo

Internet based backup solution

learn more
Carbonite lets users backup all the data on their computer as long as it’s connected to the internet. It is a cybersecurity software that allows businesses to back up their files and digital assets, as well as recover them in the event of a data loss.

Read more about Carbonite

Users also considered
HMA logo

Virtual private network software for securing online traffic

learn more
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.

Read more about HMA

Users also considered
Bitdefender GravityZone logo

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
MeSign logo

End-to-End encryption and digital signature app for emails.

learn more
Provides email encryption, digital signing and timestamping service for your corporate emails.

Auto-configure email certificates, encrypt email message automatically by default with S/MIME standard.

Cloud and on-premise key management are both supported.

Read more about MeSign

Users also considered
Symantec Endpoint Security logo

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
ChatMail logo

Engineered for Security. Designed for Privacy.

learn more
ChatMail is a custom-built secure communications app, with reinforced device security. ChatMail encrypts your calls, messages, group chats, photos, and notes.

Read more about ChatMail

Users also considered
Diplomat Managed File Transfer logo

File sharing software for the healthcare and other sectors

learn more
Diplomat MFT by Coviant Software is a secure, scalable managed file transfer solution. Automate SFTP, FTPS, HTTPS, and AS2 workflows, integrate with AWS or Azure, and meet HIPAA, PCI/DSS, or GDPR requirements, with zero breaches in 20+ years. Start your free trial today.

Read more about Diplomat Managed File Transfer

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered