getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software with Audit Management (2026) - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


34 software options

ITAC SecureFile logo

Transfer and automate files with total security

learn more
Software for secure file transfer and data management which allows companies to share and transfer files securely and meet regulatory compliance requirements.

Read more about ITAC SecureFile

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
OneVault logo

The Most Secure Solution for Archiving, Governance & DLP

learn more
Donoma OneVault delivers multi-data archiving of email and communication records for centralized, streamlined archiving.

Read more about OneVault

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
AWS Key Management Service (KMS) logo

Encryption and compliance management software

learn more
AWS Key Management Service (KMS) is an encryption and compliance management software that helps businesses create, manage, and control access to cryptographic keys across multiple AWS services.

Read more about AWS Key Management Service (KMS)

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
Klarytee logo

Data-centric Governance Platform.

learn more
Data-centric Governance Platform. Visibility. Protection. Control. For AI & Beyond.

Read more about Klarytee

Users also considered