Encryption Software

Encryption software operates as a security program that protects the content of data objects, files, networks or applications by encrypting, converting or concealing sensitive data to prevent unauthorized access.
Filter byclear all
Pricing models
Devices supported
Organization types
Geographies served
Customer rating
Integrated with
Integrated with
Features

Here's our list of apps for Encryption software. Filters help you narrow down the results to find exactly what you’re looking for.

Personalize your search in 2 clicks

Select your company sizeSelect your industry type

Personalize your search in a few taps

just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
44 apps

DriveStrike  

11
Data and device protection for businesses of all sizes
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking. Read more about DriveStrike
Learn moreAdd to compareCompareRemove app
Data and device protection for businesses of all sizes
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking. Read more about DriveStrike
Learn moreCompare

Clearlogin  

9
Cloud-based identity & access management software
Clearlogin is a web-based enterprise identity management software that helps to synchronize passwords, manage risks and increase security & compliance. Read more about Clearlogin
Learn moreAdd to compareCompareRemove app
Cloud-based identity & access management software
Clearlogin is a web-based enterprise identity management software that helps to synchronize passwords, manage risks and increase security & compliance. Read more about Clearlogin
Learn moreCompare

Indeni  

12
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.
Learn moreAdd to compareCompareRemove app
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.
Learn moreCompare

Jscrambler  

5
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler
Learn moreAdd to compareCompareRemove app
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler
Learn moreCompare

WhiteSource Software  

5
Open source security and licenses compliance
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. Read more about WhiteSource Software
Learn moreAdd to compareCompareRemove app
Open source security and licenses compliance
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. Read more about WhiteSource Software
Learn moreCompare

EventLog Analyzer  

3
Web-Based SIEM & Log Management Solution. Affordable Prices.
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management. Read more about EventLog Analyzer
Learn moreAdd to compareCompareRemove app
Web-Based SIEM & Log Management Solution. Affordable Prices.
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management. Read more about EventLog Analyzer
Learn moreCompare

SmartCryptor  

2
Encrypt your data and securely share it with others
SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data. Read more about SmartCryptor
Learn moreAdd to compareCompareRemove app
Encrypt your data and securely share it with others
SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data. Read more about SmartCryptor
Learn moreCompare

Dhound  

1
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Learn moreAdd to compareCompareRemove app
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Learn moreCompare

Fyde  

1
Network security & access management solution
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management. Read more about Fyde
Learn moreAdd to compareCompareRemove app
Network security & access management solution
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management. Read more about Fyde
Learn moreCompare

VaultCore  

1
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreAdd to compareCompareRemove app
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreCompare

Alertsec Xpress Full Disk Encryption  

2
Disk encryption management service
Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk. Alertsec Xpress is used in all organisations that have recognized the need to protect their information. Read more about Alertsec Xpress Full Disk Encryption
Learn moreAdd to compareCompareRemove app
Disk encryption management service
Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk. Alertsec Xpress is used in all organisations that have recognized the need to protect their information. Read more about Alertsec Xpress Full Disk Encryption
Learn moreCompare

Intego Flextivity Secure  

1
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Learn moreAdd to compareCompareRemove app
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Learn moreCompare

email2  

2
Email security platform
Stop worrying about sensitive information falling in the wrong hands. Maintain security and compliance and even stop forwards in their tracks with ForwardFreeze®. With guaranteed delivery and real time tracking, you can now regain control of electronic communication. Read more about email2 All with customizable features (large file transfers, true message recall, etc.) enabled within existing email programs users are so familiar with: Microsoft Outlook®, Webmail, Blackberry®, etc. - Unique non-invasive technology allows seamless secure communications with thousands of internal and external users. - Enable security and unique productivity features within existing email programs that users are familiar with, deployed within minutes with minimal training and no user workflow changes. - Allow secure messages sent in error to be completely recalled and removed from the recipient’s local email programs at any point during the life cycle of the conversation, even if the message has already been read.
Learn moreAdd to compareCompareRemove app
Email security platform
Stop worrying about sensitive information falling in the wrong hands. Maintain security and compliance and even stop forwards in their tracks with ForwardFreeze®. With guaranteed delivery and real time tracking, you can now regain control of electronic communication. Read more about email2 All with customizable features (large file transfers, true message recall, etc.) enabled within existing email programs users are so familiar with: Microsoft Outlook®, Webmail, Blackberry®, etc. - Unique non-invasive technology allows seamless secure communications with thousands of internal and external users. - Enable security and unique productivity features within existing email programs that users are familiar with, deployed within minutes with minimal training and no user workflow changes. - Allow secure messages sent in error to be completely recalled and removed from the recipient’s local email programs at any point during the life cycle of the conversation, even if the message has already been read.
Learn moreCompare

BIOWRAP  

0
Patented data encryption service
BIOWRAP is a patented data encryption service that leverages the cloud to eliminate the complexities of encryption and offer an immediate impact solution to certify, protect, track and control all types of electronic information, at all times (at rest and in motion). Read more about BIOWRAP •Immediate deployment: No costly technical requirement to build/manage the solution. •Compliance: Meet the stringent requirements to protect and track sensitive electronic information at rest and in motion. •Data Independent: Works with all file types. •Trusted Information: Encrypted files are stamped with the level of identity used to create the authoritative unalterable information (biometric, PKI certificate, username/password). •Improved Information Controls: Specify precisely who is authorized to gain access to protected information AND track all activity, including unauthorized access attempts, in real-time. •Audit Protection: Detailed and customized reports for all activity. + Plus much more
Learn moreAdd to compareCompareRemove app
Patented data encryption service
BIOWRAP is a patented data encryption service that leverages the cloud to eliminate the complexities of encryption and offer an immediate impact solution to certify, protect, track and control all types of electronic information, at all times (at rest and in motion). Read more about BIOWRAP •Immediate deployment: No costly technical requirement to build/manage the solution. •Compliance: Meet the stringent requirements to protect and track sensitive electronic information at rest and in motion. •Data Independent: Works with all file types. •Trusted Information: Encrypted files are stamped with the level of identity used to create the authoritative unalterable information (biometric, PKI certificate, username/password). •Improved Information Controls: Specify precisely who is authorized to gain access to protected information AND track all activity, including unauthorized access attempts, in real-time. •Audit Protection: Detailed and customized reports for all activity. + Plus much more
Learn moreCompare

BlueFiles  

0
File encryption and transfer for confidential data
BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing. Read more about BlueFiles
Learn moreAdd to compareCompareRemove app
File encryption and transfer for confidential data
BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing. Read more about BlueFiles
Learn moreCompare

CloudPassage Halo  

0
Instant Visibility, Continuous Protection
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Read more about CloudPassage Halo
Learn moreAdd to compareCompareRemove app
Instant Visibility, Continuous Protection
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Read more about CloudPassage Halo
Learn moreCompare

LiveEnsure  

0
Four factor user authentication
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Read more about LiveEnsure There are no complicated, ineffective tokens and cookies. Users can trust the site or application they are accessing cannot login under their identity without their permission. (Insider attack) Live Ensure™ protects the site and/or application by guaranteeing that users authenticating are genuine, valid and trusted. Sites are secured against phishing, pharming, man-in-the-middle or man-in-the-browser/trojan/virus attacks outside of their control. Login is simplified, no need to write complicated authentication logic or sign up for a federated identity solution. Implementing Live Ensure™ means sites no longer need to capture store or use private authentication data .
Learn moreAdd to compareCompareRemove app
Four factor user authentication
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Read more about LiveEnsure There are no complicated, ineffective tokens and cookies. Users can trust the site or application they are accessing cannot login under their identity without their permission. (Insider attack) Live Ensure™ protects the site and/or application by guaranteeing that users authenticating are genuine, valid and trusted. Sites are secured against phishing, pharming, man-in-the-middle or man-in-the-browser/trojan/virus attacks outside of their control. Login is simplified, no need to write complicated authentication logic or sign up for a federated identity solution. Implementing Live Ensure™ means sites no longer need to capture store or use private authentication data .
Learn moreCompare

Probely  

0
Automate Security Testing from Threat Found to Ticket Closed
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease. Read more about Probely
Learn moreAdd to compareCompareRemove app
Automate Security Testing from Threat Found to Ticket Closed
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease. Read more about Probely
Learn moreCompare

strongDM  

0
Database management solution for servers & applications
strongDM is a database management solution that helps engineers and businesses manage access to databases, servers, and Kubernetes clusters. The platform enables managers to authorize, modify or remove access to data, software, functions, or other confidential information across the organization. Read more about strongDM
Learn moreAdd to compareCompareRemove app
Database management solution for servers & applications
strongDM is a database management solution that helps engineers and businesses manage access to databases, servers, and Kubernetes clusters. The platform enables managers to authorize, modify or remove access to data, software, functions, or other confidential information across the organization. Read more about strongDM
Learn moreCompare
Filter by
Customer rating