getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Encryption Software - Page 3

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


107 software options

Keybase logo

Secure file sharing and messaging

learn more
Keybase is a secure file sharing and messaging platform that utilizes end-to-end encryption to ensure that messages, photos, videos, and documents stay private. Keybase can connect social media identities across GitHub, Twitter, Reddit, and more to encryption keys that can be controlled in a central location.

Read more about Keybase

Users also considered
Bitium logo

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Files.com logo

Automation-Focused Cloud Platform for Secure File Transfer

learn more
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.

Read more about Files.com

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
BlueFiles logo

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
Proton Pass logo

Password management solution

learn more
Proton Pass uses end-to-end encryption to secure all your data—passwords, notes, and 2FA codes—so only you can access it. Data is encrypted on your device before syncing to Proton’s servers, ensuring even Proton can’t read your information.

Read more about Proton Pass

Users also considered
Ubiq logo

Data encryption integration platform for developers

learn more
The Ubiq platform allows you to integrate data encryption directly into any application in minutes, with a few lines of code. It is interoperable across diverse applications and languages, storage types, and cloud environments.

Read more about Ubiq

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock is a cloud-based software that helps with encryption of all information and protection against unauthorized access.

Read more about DriveLock

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about Mend

Users also considered
x360Cloud logo

Back up for Microsoft 365

learn more
Designed for business use, Axcient x360Cloud - formerly CloudFinder - provides automatic, reliable and secure backup of Microsoft 365.

Read more about x360Cloud

Users also considered
EncryptTitan logo

Cloud-based email encryption software

learn more
EncryptTitan is an email encryption software designed to help businesses protect against data breaches and exchange information securely via email in compliance with various federal and state privacy regulations. Its Microsoft Outlook plugin allows users to select specific emails for encryption.

Read more about EncryptTitan

Users also considered
ITAC SecureFile logo

Transfer and automate files with total security

learn more
Software for secure file transfer and data management which allows companies to share and transfer files securely and meet regulatory compliance requirements.

Read more about ITAC SecureFile

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered
SOAX logo

Intelligent Data Collection Platform

learn more
SOAX is an intelligent data collection platform that leading companies use to collect public web data. It provides a wide range of features, including proxy servers, web crawlers, and scraper APIs. These features allow businesses to collect data from a variety of sources.

Read more about SOAX

Users also considered
NordLocker logo

NordLocker Business - an Encrypted Cloud Storage Platform

learn more
NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to safely store, manage, and share your business data. Backed by zero-knowledge architecture, it ensures that only you, your team members, and authorized users can access your company’s virtual assets.

Read more about NordLocker

Users also considered
PII Tools logo

Discover, analyze, and remediate sensitive data anywhere

learn more
PII Tools is an AI-powered tool that discovers, analyzes, and remediates sensitive data across structured and unstructured data sources. PII Tools scans through files, emails, databases, and cloud storage to detect personal and sensitive information. The software generates detailed reports to help organizations identify compliance and data privacy risks. PII Tools enables surgical redaction and cleansing of sensitive data to help mitigate breach impact.

Read more about PII Tools

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
OneVault logo

The Most Secure Solution for Archiving, Governance & DLP

learn more
Donoma OneVault delivers multi-data archiving of email and communication records for centralized, streamlined archiving.

Read more about OneVault

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered