Encryption Software

Encryption software operates as a security program that protects the content of data objects, files, networks or applications by encrypting, converting or concealing sensitive data to prevent unauthorized access.
Filter byclear all
Pricing models
Devices supported
Organization types
Geographies served
Customer rating
Integrated with
Integrated with
Features

Personalize your search in 2 clicks

Select your company sizeSelect your industry type

Personalize your search in a few taps

just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
32 apps

1Password   

885
Password manager for businesses and families
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them. Read more about 1Password
Password manager for businesses and families
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them. Read more about 1Password

Avast Business   

658
Cloud-based security software solution
Avast Business is a cloud-based security software for commercial organizations that helps to protect endpoint devices as well as file and email servers. Read more about Avast Business
Cloud-based security software solution
Avast Business is a cloud-based security software for commercial organizations that helps to protect endpoint devices as well as file and email servers. Read more about Avast Business

NordVPN  

338
VPN cloud security service
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties. Read more about NordVPN
VPN cloud security service
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties. Read more about NordVPN

Webroot®   

145
Smarter Cybersecurity® Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot®
Smarter Cybersecurity® Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot®

OneLogin   

44
Cloud-Based Identity Management & Single Sign-On System
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP. Read more about OneLogin
Cloud-Based Identity Management & Single Sign-On System
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP. Read more about OneLogin

Cloud Management Suite   

30
Cloud-based IT operations management suite
Cloud Management Suite is a cloud-based software management solution that helps managed service providers and businesses in software patching and remote access. Read more about Cloud Management Suite
Cloud-based IT operations management suite
Cloud Management Suite is a cloud-based software management solution that helps managed service providers and businesses in software patching and remote access. Read more about Cloud Management Suite

SolarWinds Passportal   

45
Encrypted cloud-based, automated password protection
SolarWinds Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities… Read more about SolarWinds Passportal
Encrypted cloud-based, automated password protection
SolarWinds Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities… Read more about SolarWinds Passportal

EventSentry   

18
Real-time log & event log hybrid SIEM monitoring solution
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more… Read more about EventSentry
Real-time log & event log hybrid SIEM monitoring solution
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more… Read more about EventSentry

Acunetix   

32
Integrated vulnerability management & network security
Acunetix is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more… Read more about Acunetix
Integrated vulnerability management & network security
Acunetix is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more… Read more about Acunetix

Netsparker Security Scanner   

15
Security scanning & vulnerability management
Netsparker Security Scanner automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services. Read more about Netsparker Security Scanner
Security scanning & vulnerability management
Netsparker Security Scanner automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services. Read more about Netsparker Security Scanner

Bitium  

17
Securely manage and provision your company’s apps, users and passwords in one place.
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. Read more about Bitium With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.
Securely manage and provision your company’s apps, users and passwords in one place.
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. Read more about Bitium With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.

OmniNet  

15
Enterprise-level security technology for SMBs
A multi-layered security solution that provides SMBs with top-notch protection against network malware, malicious links or content, and threats or intrusions. Read more about OmniNet
Enterprise-level security technology for SMBs
A multi-layered security solution that provides SMBs with top-notch protection against network malware, malicious links or content, and threats or intrusions. Read more about OmniNet

Black Duck Hub  

28
Complete open source management solution
Black Duck Hub is an open source management software for web developers to discover, monitor & manage open source security vulnerabilities & license compliance. Read more about Black Duck Hub
Complete open source management solution
Black Duck Hub is an open source management software for web developers to discover, monitor & manage open source security vulnerabilities & license compliance. Read more about Black Duck Hub

Clearlogin  

9
Cloud-based identity & access management software
Clearlogin is a web-based enterprise identity management software that helps to synchronize passwords, manage risks and increase security & compliance. Read more about Clearlogin
Cloud-based identity & access management software
Clearlogin is a web-based enterprise identity management software that helps to synchronize passwords, manage risks and increase security & compliance. Read more about Clearlogin

Indeni  

12
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.

Jscrambler  

5
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler

DriveStrike  

3
Data and device protection for businesses of all sizes
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking. Read more about DriveStrike
Data and device protection for businesses of all sizes
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking. Read more about DriveStrike

EventLog Analyzer  

3
Security information and event management solution
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management. Read more about EventLog Analyzer
Security information and event management solution
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management. Read more about EventLog Analyzer

SmartCryptor  

2
Encrypt your data and securely share it with others
SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data. Read more about SmartCryptor
Encrypt your data and securely share it with others
SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data. Read more about SmartCryptor

Dhound  

1
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound

Alertsec Xpress Full Disk Encryption  

2
Disk encryption management service
Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk. Alertsec Xpress is used in all organisations that have recognized the need to protect their information. Read more about Alertsec Xpress Full Disk Encryption
Disk encryption management service
Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk. Alertsec Xpress is used in all organisations that have recognized the need to protect their information. Read more about Alertsec Xpress Full Disk Encryption

Intego Flextivity Secure  

1
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure

Veriato   

1
Computer and Internet Monitoring Software
Veriato (formerly SpectorSoft) allows monitoring, recording & reviewing of computer, internet and mobile phone activity in businesses, governments, and education institutions. Read more about Veriato
Computer and Internet Monitoring Software
Veriato (formerly SpectorSoft) allows monitoring, recording & reviewing of computer, internet and mobile phone activity in businesses, governments, and education institutions. Read more about Veriato

email2  

2
Email security platform
Stop worrying about sensitive information falling in the wrong hands. Maintain security and compliance and even stop forwards in their tracks with ForwardFreeze®. With guaranteed delivery and real time tracking, you can now regain control of electronic communication. Read more about email2 All with customizable features (large file transfers, true message recall, etc.) enabled within existing email programs users are so familiar with: Microsoft Outlook®, Webmail, Blackberry®, etc. - Unique non-invasive technology allows seamless secure communications with thousands of internal and external users. - Enable security and unique productivity features within existing email programs that users are familiar with, deployed within minutes with minimal training and no user workflow changes. - Allow secure messages sent in error to be completely recalled and removed from the recipient’s local email programs at any point during the life cycle of the conversation, even if the message has already been read.
Email security platform
Stop worrying about sensitive information falling in the wrong hands. Maintain security and compliance and even stop forwards in their tracks with ForwardFreeze®. With guaranteed delivery and real time tracking, you can now regain control of electronic communication. Read more about email2 All with customizable features (large file transfers, true message recall, etc.) enabled within existing email programs users are so familiar with: Microsoft Outlook®, Webmail, Blackberry®, etc. - Unique non-invasive technology allows seamless secure communications with thousands of internal and external users. - Enable security and unique productivity features within existing email programs that users are familiar with, deployed within minutes with minimal training and no user workflow changes. - Allow secure messages sent in error to be completely recalled and removed from the recipient’s local email programs at any point during the life cycle of the conversation, even if the message has already been read.
Encryption Software Buyers Guide

What is Encryption Software?

Find the best encryption software, compare and choose your encryption solution. All the best encryption software, applications and tools with user reviews and ratings. GetApp.com provides quality software, SaaS and Cloud listings for security solutions, network security, wireless security, computer security, information security, crypto and data security.

Encryption Software Comparison

Use GetApp to find the best Encryption software and services for your needs. Our intuitive directory allows you to make an easy online Encryption software comparison in just a few minutes by filtering by deployment method (such as Web-based, Cloud Computing or Client-Server), operating system (including Mac, Windows, Linux, iOS, Android), pricing (including Free and Subscription), platform (including Google Apps, Salesforce, Intuit, NetSuite, SAP) and supported location.

Filter by
Customer rating