App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software - Page 3 (2025)

Last updated: March 2025

122 software options

NordLayer logo
Category Leaders

A toggle-ready way to secure your network.

learn more
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.

Read more about NordLayer

Users also considered
Hushmail logo

Email, web form, and e-signature solution for healthcare

learn more
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.

Read more about Hushmail

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
Invicti logo

Security scanning & vulnerability management

learn more
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Keybase logo

Secure file sharing and messaging

learn more
Keybase is a secure file sharing and messaging platform that utilizes end-to-end encryption to ensure that messages, photos, videos, and documents stay private. Keybase can connect social media identities across GitHub, Twitter, Reddit, and more to encryption keys that can be controlled in a central location.

Read more about Keybase

Users also considered
Bitium logo

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Files.com logo

Automation-Focused Cloud Platform for Secure File Transfer

learn more
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.

Read more about Files.com

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
RG System logo

French unified IT management platform for MSP and IT pros

learn more
RG System's SaaS IT management portal offers MSPs, IT professionals and Office automation company complementary RMM, Microsoft 365 Data backup and recovery, cybersecurity and remote control functions in a single portal.

Read more about RG System

Users also considered
BlueFiles logo

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Mailinblack logo

Cloud-based & on-premise email protection software

learn more
Protecting businesses from malware, phishing, ransomware, and spam emails.

Read more about Mailinblack

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
GhostVolt logo

Powerful encryption software with all the features you need.

learn more
GhostVolt Solo enables users to easily password-protect files, photos, tax and health records, tax forms, or any other digital file or document with seamless and proven 256-bit enterprise-level encryption.

Read more about GhostVolt

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
Ubiq logo

Data encryption integration platform for developers

learn more
The Ubiq platform allows you to integrate data encryption directly into any application in minutes, with a few lines of code. It is interoperable across diverse applications and languages, storage types, and cloud environments.

Read more about Ubiq

Users also considered
x360Cloud logo

Back up for Microsoft 365

learn more
Designed for business use, Axcient x360Cloud - formerly CloudFinder - provides automatic, reliable and secure backup of Microsoft 365.

Read more about x360Cloud

Users also considered
ITAC SecureFile logo

Transfer and automate files with total security

learn more
Software for secure file transfer and data management which allows companies to share and transfer files securely and meet regulatory compliance requirements.

Read more about ITAC SecureFile

Users also considered
SOAX logo

Intelligent Data Collection Platform

learn more
SOAX is an intelligent data collection platform that leading companies use to collect public web data. It provides a wide range of features, including proxy servers, web crawlers, and scraper APIs. These features allow businesses to collect data from a variety of sources.

Read more about SOAX

Users also considered
WhiteSource logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about WhiteSource

Users also considered
NordLocker logo

NordLocker Business - an Encrypted Cloud Storage Platform

learn more
NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to safely store, manage, and share your business data. Backed by zero-knowledge architecture, it ensures that only you, your team members, and authorized users can access your company’s virtual assets.

Read more about NordLocker

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
OneVault logo

The Most Secure Solution for Archiving, Governance & DLP

learn more
Donoma OneVault delivers multi-data archiving of email and communication records for centralized, streamlined archiving.

Read more about OneVault

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered