App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Encryption Software - Page 3

117 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Keybase logo
4.6
(20)

Secure file sharing and messaging

learn more
Keybase is a secure file sharing and messaging platform that utilizes end-to-end encryption to ensure that messages, photos, videos, and documents stay private. Keybase can connect social media identities across GitHub, Twitter, Reddit, and more to encryption keys that can be controlled in a central location.

Read more about Keybase

Users also considered
Bitium logo
4.6
(18)

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
Black Duck logo
4.2
(29)

Build secure, high-quality software faster.

learn more
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.

Read more about Black Duck

Users also considered
Files.com logo
4.6
(18)

Automation-Focused Cloud Platform for Secure File Transfer

learn more
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.

Read more about Files.com

Users also considered
Probely logo
4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
RG System logo
4.8
(13)

French unified IT management platform for MSP and IT pros

learn more
RG System's SaaS IT management portal offers MSPs, IT professionals and Office automation company complementary RMM, Microsoft 365 Data backup and recovery, cybersecurity and remote control functions in a single portal.

Read more about RG System

Users also considered
BlueFiles logo
5.0
(10)

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
CyberArk Privileged Access Manager logo
4.3
(20)

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Manager

Users also considered
Mailinblack logo
4.7
(12)

Cloud-based & on-premise email protection software

learn more
Protecting businesses from malware, phishing, ransomware, and spam emails.

Read more about Mailinblack

Users also considered
Indeni logo
4.5
(13)

The Automation Platform for IT

learn more
Indeni makes it easy to manage the infrastructure of digital businesses. Indeni Knowledge and Indeni Insight offers integrations to critical devices, built-in automation, and easy-to-read remediation instructions that allow IT users to move from reactive to proactive infrastructure management.

Read more about Indeni

Users also considered
Qualys Cloud Platform logo
3.9
(27)

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
AwareGO logo
4.5
(11)

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
Vault logo
4.8
(8)

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Brandwise logo
4.8
(8)

Product Authentication & Consumer Data

learn more
Brandwise is an enterprise-grade digitization application for brands to authenticate products and engage with consumers. It is powered by blockchain.

Read more about Brandwise

Users also considered
GhostVolt logo
4.7
(7)

Powerful encryption software with all the features you need.

learn more
GhostVolt Solo enables users to easily password-protect files, photos, tax and health records, tax forms, or any other digital file or document with seamless and proven 256-bit enterprise-level encryption.

Read more about GhostVolt

Users also considered
Jscrambler logo
4.4
(9)

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
Ubiq logo
5.0
(5)

Data encryption integration platform for developers

learn more
The Ubiq platform allows you to integrate data encryption directly into any application in minutes, with a few lines of code. It is interoperable across diverse applications and languages, storage types, and cloud environments.

Read more about Ubiq

Users also considered
x360Cloud logo
4.0
(12)

Back up for Microsoft 365

learn more
Designed for business use, Axcient x360Cloud - formerly CloudFinder - provides automatic, reliable and secure backup of Microsoft 365.

Read more about x360Cloud

Users also considered
EncryptTitan logo
4.7
(6)

Cloud-based email encryption software

learn more
EncryptTitan is an email encryption software designed to help businesses protect against data breaches and exchange information securely via email in compliance with various federal and state privacy regulations. Its Microsoft Outlook plugin allows users to select specific emails for encryption.

Read more about EncryptTitan

Users also considered
SOAX logo
5.0
(4)

Intelligent Data Collection Platform

learn more
SOAX is an intelligent data collection platform that leading companies use to collect public web data. It provides a wide range of features, including proxy servers, web crawlers, and scraper APIs. These features allow businesses to collect data from a variety of sources.

Read more about SOAX

Users also considered
AppviewX CERT+ logo
5.0
(4)

AppViewX CERT+ Simplifies Certificate Lifecycle Management

learn more
AppViewX CERT+ is a ready-to-consume, scalable, and efficient certificate lifecycle management (CLM) solution to effectively automate and manage machine and application identities as an integral part of your cybersecurity strategy.

Read more about AppviewX CERT+

Users also considered
HackEDU logo
4.5
(6)

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about HackEDU

Users also considered
WhiteSource logo
4.3
(7)

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about WhiteSource

Users also considered
ManageEngine EventLog Analyzer logo
4.8
(4)

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
NordLocker logo
4.4
(5)

NordLocker Business - an Encrypted Cloud Storage Platform

learn more
NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to safely store, manage, and share your business data. Backed by zero-knowledge architecture, it ensures that only you, your team members, and authorized users can access your company’s virtual assets.

Read more about NordLocker

Users also considered