getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software for Linux - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


60 software options

Proton VPN logo

VPN with DNS filter function and Secure Core architecture.

learn more
Lock down sensitive data with Proton VPN. Everything is safe with unbreakable encryption — no leaks, no logs, no complexity.

Read more about Proton VPN

Users also considered
HMA logo

Virtual private network software for securing online traffic

learn more
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.

Read more about HMA

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
NordLayer logo
Category Leaders

A toggle-ready way to secure your network.

learn more
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.

Read more about NordLayer

Users also considered
EventSentry logo

Real-time log & event log hybrid SIEM monitoring solution

learn more
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more

Read more about EventSentry

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Trustifi logo

Protect Your Business Emails with AI-Powered Security

learn more
Email security solution that helps manage threat detection, regulatory compliance, data encryption, whitelisting/blacklisting, and more.

Read more about Trustifi

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
Proton Pass logo

Password management solution

learn more
Proton Pass uses end-to-end encryption to secure all your data—passwords, notes, and 2FA codes—so only you can access it. Data is encrypted on your device before syncing to Proton’s servers, ensuring even Proton can’t read your information.

Read more about Proton Pass

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock is a cloud-based software that helps with encryption of all information and protection against unauthorized access.

Read more about DriveLock

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about Mend

Users also considered
ITAC SecureFile logo

Transfer and automate files with total security

learn more
Software for secure file transfer and data management which allows companies to share and transfer files securely and meet regulatory compliance requirements.

Read more about ITAC SecureFile

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
NordLocker logo

NordLocker Business - an Encrypted Cloud Storage Platform

learn more
NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to safely store, manage, and share your business data. Backed by zero-knowledge architecture, it ensures that only you, your team members, and authorized users can access your company’s virtual assets.

Read more about NordLocker

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
PII Tools logo

Discover, analyze, and remediate sensitive data anywhere

learn more
PII Tools is an AI-powered tool that discovers, analyzes, and remediates sensitive data across structured and unstructured data sources. PII Tools scans through files, emails, databases, and cloud storage to detect personal and sensitive information. The software generates detailed reports to help organizations identify compliance and data privacy risks. PII Tools enables surgical redaction and cleansing of sensitive data to help mitigate breach impact.

Read more about PII Tools

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Dhound logo

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
Fortanix Data Security Manager logo

Data security solution

learn more
Fortanix Data Security Manager (DSM) is a data-first, unified security and privacy platform that is powered by Confidential Computing. The DSM platform is a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing across all manners of data protection.

Read more about Fortanix Data Security Manager

Users also considered
NoID logo

We protect email, what you write, read and attach

learn more
NoID is a cloud-based secure email encryption platform. NoID SecureEmail delivers emails from A to B encrypted "On send", and decrypted "On receive". It runs parallel to the existing email solution without any requirement to change any part of it.

Read more about NoID

Users also considered
CloudJacket MDR logo

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
In today's digital landscape, organizations face an ever-evolving array of cyber threats. Secnap's CloudJacket MDR offers a comprehensive, AI-augmented security solution that combines advanced technology with 24/7 expert monitoring, delivering robust protection.

Read more about CloudJacket MDR

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered