getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software with Access Controls/Permissions (2026) - Page 4

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


101 software options

Fortanix Data Security Manager logo

Data security solution

learn more
Fortanix Data Security Manager (DSM) is a data-first, unified security and privacy platform that is powered by Confidential Computing. The DSM platform is a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing across all manners of data protection.

Read more about Fortanix Data Security Manager

Users also considered
FTAPI logo

Secure and automate your sensitive data.

learn more
FTAPI, a Munich-based software specialist, offers a comprehensive platform for easy and secure data workflows and automation. Using leading encryption technologies, these workflows are protected at all times - whether it concerns sending or receiving data, structured data input, sharing confidential

Read more about FTAPI

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
MeSign logo

End-to-End encryption and digital signature app for emails.

learn more
Provides email encryption, digital signing and timestamping service for your corporate emails.

Auto-configure email certificates, encrypt email message automatically by default with S/MIME standard.

Cloud and on-premise key management are both supported.

Read more about MeSign

Users also considered
PrivMX Fusion logo

Collaboration software with zero-knowledge encryption

learn more
All-in-one, privacy-by-design collaboration software for all kinds of teams, with virtual workspace protected by zero-knowledge encryption. It helps teams organise and manage daily tasks, files and communication in a fresh new way, making it easier to focus and stay goal-oriented.

Read more about PrivMX Fusion

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
CenterDevice logo

Software for the secure management of sensitive documents.

learn more
CenterDevice is software for document management, which enables the secure management of sensitive documents in accordance with GDPR, GoBD, and C5 guidelines. For this purpose, users can access various functions to archive, exchange, and manage documents.

Read more about CenterDevice

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
OpenText Data Privacy and Protection logo

Data privacy and protection portfolio

learn more
Voltage is a data privacy and protection portfolio that can be used for data privacy readiness, secure collaboration, structured data optimization, and other use cases. It offers solutions for file analysis, sensitive data management, encrypted email, and more.

Read more about OpenText Data Privacy and Protection

Users also considered
iQ.Suite aaS logo

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
Basis Theory logo

A compliant platform to secure, use, and manage your data

learn more
A compliant and developer-friendly platform to secure, use, and manage the data that matters most to you.

Read more about Basis Theory

Users also considered
Zoho ToDo logo

Application for creating, tracking, and managing tasks

learn more
Zoho ToDo is a task management tool designed to help businesses create and manage tasks. With Zoho ToDo, you can effortlessly organize, collaborate, and track your tasks via a unified portal. Whether you're working on personal projects or collaborating with a team, the application provides a streamlined workflow that helps you stay on top of your tasks.

Read more about Zoho ToDo

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
LAN Crypt File and Folder Encryption logo

Designed for businesses of all sizes and all in industries.

learn more
u.trust LAN Crypt protects your confidential files against unauthorized external or internal access.

Furthermore, u.trust LAN Crypt uses a strict role split approach: The network administrator can access and
manage files and the security officer manages keys and security policies.

Read more about LAN Crypt File and Folder Encryption

Users also considered
CipherTrust Data Security Platform logo

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
InPrivy logo

Share and receive sensitive information across the web.

learn more
InPrivy helps businesses share and receive passwords and other sensitive information and secure confidential data. Key features include custom branding and domain, public sharing URL, password protection, and team management.

Read more about InPrivy

Users also considered
Socializer Messenger logo

Highly encrypted solution for internal communication

learn more
A messaging solution for companies and governments that places a high value on privacy and security. In addition to all the features known from established messaging solutions, it offers unique privacy features under the highest level of encryption to address often overlooked security gaps.

Read more about Socializer Messenger

Users also considered
Xecrets Ez logo

Encryption software for macOS, Linux, and Windows

learn more
Xecrets Ez is a free, cross-platform desktop app for Windows, macOS, and Linux. It offers AES-256 file encryption, a simple UI, and secure deletion of originals. Works fully offline, with optional premium features like YubiKey support and Shamir’s Secret Sharing.

Read more about Xecrets Ez

Users also considered
Klarytee logo

Data-centric Governance Platform.

learn more
Data-centric Governance Platform. Visibility. Protection. Control. For AI & Beyond.

Read more about Klarytee

Users also considered
Confidencial logo

Cloud-based data protection and security solution

learn more
Confidencial is a document security solution that enables users to protect sensitive data with granular encryption controls.

Read more about Confidencial

Users also considered
TDAccess logo

Encryption software

learn more
Latest cross-platform compression and transmission capabilities that meets (FIPS) 140-2 requirements.

Read more about TDAccess

Users also considered
Data Krypter logo

On-premise encryption software

learn more
Data Krypter is an encryption software that protects data by encrypting files, folders, and text.

Read more about Data Krypter

Users also considered
Proton Drive logo

Secure cloud storage with end-to-end encryption

learn more
Proton Drive offers end-to-end encrypted cloud storage in Switzerland, enabling secure file storage, access, and sharing. Zero-access encryption ensures only users and authorized recipients can access files, with options like password-protected links and expiring access. Protected by Swiss privacy laws and built on open-source tech, Proton Drive supports secure document collaboration while safeguarding user privacy.

Read more about Proton Drive

Users also considered
MySecureFolder logo

AES-256 folder encryption solution for securing local data

learn more
MySecureFolder is a Windows security solution that uses AES-256-GCM encryption to lock and protect folders locally on the system. It prevents unauthorized users from opening, copying, or accessing sensitive files, even if moved or copied. All encryption is performed offline for maximum privacy.

Read more about MySecureFolder

Users also considered
WorkBot logo

Encryption solution

learn more
AI-powered chatbot, chat agent, and voice agent that automate support, engage users, and boost business efficiency.

Read more about WorkBot

Users also considered