getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

iPhone Encryption Applications - Page 2

Last updated: April 2026

2 filters applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


40 software options

Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
Proton VPN logo

VPN with DNS filter function and Secure Core architecture.

learn more
Lock down sensitive data with Proton VPN. Everything is safe with unbreakable encryption — no leaks, no logs, no complexity.

Read more about Proton VPN

Users also considered
AxCrypt logo

AxCrypt, File encryption software, Password manager

learn more
AxCrypt is a file encryption software that provides secure data storage and sharing. AxCrypt is designed to be user-friendly while maintaining a high level of encryption for sensitive information.

Read more about AxCrypt

Users also considered
NordLayer logo
Category Leaders

Cloud-based network security platform for businesses

learn more
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.

Read more about NordLayer

Users also considered
Trustifi logo

Protect Your Business Emails with AI-Powered Security

learn more
Email security solution that helps manage threat detection, regulatory compliance, data encryption, whitelisting/blacklisting, and more.

Read more about Trustifi

Users also considered
Hushmail logo

Email, web form, and e-signature solution for healthcare

learn more
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.

Read more about Hushmail

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
Keybase logo

Secure file sharing and messaging

learn more
Keybase is a secure file sharing and messaging platform that utilizes end-to-end encryption to ensure that messages, photos, videos, and documents stay private. Keybase can connect social media identities across GitHub, Twitter, Reddit, and more to encryption keys that can be controlled in a central location.

Read more about Keybase

Users also considered
Files.com logo

Secure File Orchestration for a Cloud World

learn more
Files.com is a cloud-native MFT and file orchestration platform for secure file transfer, storage, automation, and compliance — with deep integrations across cloud providers, protocols, and enterprise workflows.

Read more about Files.com

Users also considered
Proton Pass logo

Password management solution

learn more
Proton Pass uses end-to-end encryption to secure all your data—passwords, notes, and 2FA codes—so only you can access it. Data is encrypted on your device before syncing to Proton’s servers, ensuring even Proton can’t read your information.

Read more about Proton Pass

Users also considered
x360Cloud logo

Back up for Microsoft 365

learn more
Designed for business use, Axcient x360Cloud - formerly CloudFinder - provides automatic, reliable and secure backup of Microsoft 365.

Read more about x360Cloud

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered
NordLocker logo

NordLocker Business - an Encrypted Cloud Storage Platform

learn more
NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to safely store, manage, and share your business data. Backed by zero-knowledge architecture, it ensures that only you, your team members, and authorized users can access your company’s virtual assets.

Read more about NordLocker

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
ClearVPN logo

VPN software for securely browsing the internet

learn more
ClearVPN is a cloud-based software designed to help businesses manage virtual private networks (VPN) to securely connect with public networks, browse the internet, and access blocked applications or websites via a unified portal. The platform offers personalized shortcuts based on location, application activities, and network status, enabling users to view and access popular websites, apps, or trending content via a centralized dashboard.

Read more about ClearVPN

Users also considered