Oh no! Some styles failed to load. 😵 Please try reloading this page

Encryption Software

Compare the Top Encryption Software of 2021

Encryption Software Guide

What is Encryption Software?

Encryption software allows companies to protect and secure data using cryptography to protect valuable files and sensitive data and enhance security. Compare the best Encryption software currently available using the table below.

  • 1
    Trustifi

    Trustifi

    Trustifi

    Trustifi offers industry-leading solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, data encryption & more. Easily deployed on: Outlook, Gmail, or any email server by relay **Advanced Threat Protection**: -Malware and ransomware virus detection, BEC attack prevention and alerts **Data Loss Prevention**: -100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more **Encryption**: -NSA-grade. Select Enterprise customers have access to company branding and product white labeling. Plus one-on-one team training. Encryption needs aren’t one-size-fits-all, so your email security platform shouldn’t be either. Customized solutions are available upon request, often without charge.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 2
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
    View Software
    Visit Website
  • 3
    N-able Mail Assure
    N-able Mail Assure cloud-based email security solution provides advanced threat protection for inbound and outbound email using collective threat intelligence, 24/7 email continuity, and long-term email archiving. The service includes a multitenant web-interface with predefined settings, reporting, and views designed to ensure control and visibility over email flows. N-able Mail Assure’s proprietary technology incorporates input from processing large volumes of email data that feeds the Intelligent Protection and Filtering Engine. This combined with real-time pattern threat recognition leveraging a variety of filtering technologies help protect against spam, viruses, phishing attacks, impersonation, spoofing, malware, and other email-borne threats.
  • 4
    Immuta

    Immuta

    Immuta

    Immuta is the universal cloud data access control platform, providing data engineering and operations teams one platform to control access to analytical data sets in the cloud. Only Immuta can automate access control for any data, on any cloud service, across all compute infrastructure. Data-driven organizations around the world rely on Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA.
  • 5
    Keeper

    Keeper

    Keeper Security

    Cybersecurity starts with password security. Protect your business from password-related data breaches and cyberthreats with Keeper's powerful password security platform. Research shows that a whopping 81% of data breaches are due to weak or stolen passwords. Password security platforms provide an affordable and simple way for companies to solve the single biggest root cause of most data breaches. By implementing Keeper, your business is significantly reducing the risk of a data breach. Keeper creates random, high-strength passwords for all websites and applications then stores them in a secure vault on all user devices. Each employee gets a private, encrypted vault for storing and managing their passwords, credentials, files and private client data. Save employees time, frustration and eliminate the need for them to reset, reuse and remember passwords. Strict and customizable role-based access controls, 2FA, usage auditing and event reporting provide industry compliance.
    Leader badge
    Starting Price: keeper-max
  • 6
    ProtonMail

    ProtonMail

    ProtonMail

    ProtonMail is incorporated in Switzerland and all our servers are located in Switzerland. This means all user data is protected by strict Swiss privacy laws. All emails are secured automatically with end-to-end encryption. This means even we cannot decrypt and read your emails. As a result, your encrypted emails cannot be shared with third parties. No personal information is required to create your secure email account. By default, we do not keep any IP logs which can be linked to your anonymous email account. Your privacy comes first. We believe email privacy should be available to all. That's why our code is open source and basic ProtonMail accounts are always free. You can support the project by donating or upgrading to a paid account. ProtonMail can be used on any device without software install. ProtonMail Business allows you to keep your business email address ([email protected]). Send and receive encrypted emails both inside and outside of your organisation.
    Leader badge
    Starting Price: $6.25 per user per month
  • 7
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Leader badge
    Starting Price: $38 per user per year
  • 8
    MimeCast Email Security
    Mimecast Secure Email Gateway protects organizations and employees from spear-phishing, malware, spam and zero-day attacks by combining innovative applications and policies with multiple detection engines and intelligence feeds to keep sophisticated attackers out.
  • 9
    NordLocker

    NordLocker

    Tefincom

    Leading-edge encryption at your fingertips. We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords. Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients.
    Starting Price: $1.49 per month
  • 10
    Tresorit

    Tresorit

    Tresorit

    End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shield
    Starting Price: $10.42/month
  • 11
    Boxcryptor

    Boxcryptor

    Secomba GmbH

    Boxcryptor is an encryption solution for cloud storages, such as Dropbox, Google Drive or Microsoft OneDrive as well as for Microsoft Teams, On-Prem Fileserver or local data. It is available on all platforms — for example Windows, Mac, iOS, Android. It is optimized for team work and gives you full control over your data. There are various features for businesses, such as two-factor authentication, custom policies and a master key provided from an administration panel.
    Starting Price: $48.00/year
  • 12
    BitLocker

    BitLocker

    Microsoft

    BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM.
  • 13
    Folder Lock

    Folder Lock

    NewSoftwares.net

    NewSoftwares.net is a Australia software company that was founded in 2002, and offers a software title called Folder Lock. Folder Lock offers training via documentation. Folder Lock offers a free version and free trial. Folder Lock is business continuity software, and includes features such as backup log, compression, continuous backup, encryption, local server options, multiple system support, remote server options, secure data storage, and web access / restoration. With regards to system requirements, Folder Lock is available as Windows, iPhone, iPad, and Android software. Costs start at $39.95/one-time/user. Folder Lock includes business hours support and online support. Some alternative products to Folder Lock include ESET Endpoint Security, N-able Mail Assure, and Tresorit.
    Starting Price: $39.95/one-time/user
  • 14
    Cubbit for Teams
    Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.
    Starting Price: €6 per user, per month
  • 15
    Box KeySafe
    KeySafe with AWS GovCloud enables government agencies and government contractors to gain independent control over their content encryption keys for content that has citizen-only and ITAR requirements. Unreleased screenplays, top-secret designs, and patents to a new drug are among the most valuable assets you have. At the same time, to bring your ideas to market, these assets need to be shared with your contractors, partners, and vendors. Use KeySafe to stay in stay in control of sensitive IP that is shared widely throughout your ecosystem of partners and contractors. Clients of your firm entrust you with their most sensitive content and bank on their data being safeguarded from unauthorized third party access. Use KeySafe to meet your ethical and legal obligations for protection of client data by putting appropriate controls in place to prevent and turn off access to documents, and minimize the reputation risk associated with someone else looking at your clients' data.
    Starting Price: $130 per month
  • 16
    Cryptomator

    Cryptomator

    Skymatic GmbH

    Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all.
  • 17
    GhostVolt

    GhostVolt

    GhostVolt

    Powerful encryption software with all the features you need. Password protect your personal files with enterprise level encryption. Secure all your personal information including your photos, movies, credit card data, tax returns or any other private document. If your files are stolen, breached or hacked their contents are secured and unreadable by hackers and criminals. Data encryption completely obscures your personal infomation, rendering it completely useless to any invasive attacker. Simply add your files and folders as normal. GhostVolt encrypts your data automatically and keeps it that way. GhostVolt uses enterprise level 256-bit AES encryption to secure your data on your computer or home network. GhostVolt is built to work like your usual file explorer, so you already know how to use it. Encrypt all your sensitive files and folders including your photos, movies or any other private document.
    Starting Price: $35 per year
  • 18
    Sookasa

    Sookasa

    Sookasa

    Cloud-based solution that allows businesses to detect breach threats, encrypt data and enforce security policies. Rely on a single, seamless CASB solution to detect breach risks, encrypt data, and enforce your security policies—across all the tools your team loves, from Dropbox to OneDrive to Slack. Sookasa works only on Mac OS High Sierra and Mojave. We are not compatible with Catalina or BigSur. We suggest customers not to upgrade their OS if they want to use Sookasa. Similarly Sookasa is compatible with Windows 10 build version 1803 and below. The later releases of Windows 10 are not supported. Sookasa offers two products to help you detect risks in your cloud accounts by leveraging the APIs of our integration partners. Sookasa’s patented file-level encryption protects data both on devices and in the cloud, and decouples the data from the encryption keys. With Sookasa’s Audit product, you can quickly check that your team is using and sharing data on SaaS solutions securely.
    Starting Price: $10 per user per month
  • 19
    east-tec SafeBit
    east-tec SafeBit is a disk encryption software and the perfect solution for protecting your data against potential unauthorized access and information leaks. It features on-the-fly disk encryption, by creating virtual disk drives, where you can [hide files & folders](/safebit/hide-folders/), keep them encrypted all the time, but still work with these files just like you work with normal files. east-tec SafeBit is a disk encryption software that helps you protect your confidential information from unauthorized access, data breaches, or computer theft. It is the perfect add-on to computer privacy software by allowing you to install and execute programs inside encrypted vaults, therefore leave all your traces encrypted inside the safe. Encrypt folders and files on-the-fly with east-tec SafeBit. On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention.
    Starting Price: $29.95 one-time payment
  • 20
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 21
    MOVEit

    MOVEit

    Progress

    MOVEit Managed File Transfer (MFT) software is used by thousands of organizations around the world to provide complete visibility and control over file transfer activities. Assure the reliability of core business processes and the secure and compliant transfer of sensitive data between partners, customers, users and systems with MOVEit. MOVEit's flexible architecture allows you to choose the exact capabilities to match your organizations specific needs. MOVEit Transfer enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It provides the security, centralized access controls, file encryption and activity tracking needed to ensure operational reliability and compliance with SLA, internal governance and regulatory requirements. MOVEit Automation works with MOVEit Transfer or FTP systems to provide advanced workflow automation capabilities without the need for scripting.
    Starting Price: $14,995
  • 22
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 23
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 24
    Smartcrypt

    Smartcrypt

    PKWARE

    Companies that use PKWARE’s Smartcrypt to protect data within the organization can also use Smartcrypt to share encrypted files with individuals and groups outside the company. The free Smartcrypt Reader is available for download by anyone, and can be used to decrypt and open files that have been secured using Smartcrypt. Smartcrypt Reader is available for Windows and Mac platforms. Unlike other approaches that require senders to share encryption passphrases with recipients or deal with complex PKI workflows, the Smartcrypt Reader can automatically retrieve encryption keys for authorized users—even external users—eliminating one of the biggest security challenges in external data exchange. When a Smartcrypt user needs to share sensitive data with someone outside the company, the Smartcrypt user creates (or selects) a Smartkey that is associated with the recipient’s email address. Files can then be encrypted using that Smartkey and shared via email, cloud storage, or any other medium.
  • 25
    IBM Security Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next