Alternatives to Symantec Endpoint Encryption
Compare Symantec Endpoint Encryption alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Symantec Endpoint Encryption in 2026. Compare features, ratings, user reviews, pricing, and more from Symantec Endpoint Encryption competitors and alternatives in order to make an informed decision for your business.
-
1
Proton Drive
Proton AG
Proton Drive is the all-in-one workspace for storing sensitive data and collaborating with your teams, clients, and partners. Collaborate securely without compromising control: Share client files, contracts, and sensitive business documents with full end-to-end encryption. You control who can access what. Set passwords, add expiry dates, or revoke access anytime. Protect all your business data: Plans come with 1 TB of storage allowance per user, giving your team enough space for all their files and docs. You can always add more storage later if needed. Simplify compliance across industries: Proton Drive supports GDPR, HIPAA, NIS2, DORA, and ISO 27001 compliance out of the box, and has been successfully audited for SOC 2 Type II. There's no need for custom configurations or third-party tools, as this helps you meet regulatory standards with minimal effort. -
2
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022. -
3
Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
-
4
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. -
5
ProxySG and Advanced Secure Gateway
Broadcom
Symantec delivers high-performance on-premises secure web gateway appliances that protect organizations across the web, social media, applications, and mobile networks. Combine with cloud-delivered Web Security Service for a centrally-managed, hybrid secure web solution. Symantec protects organizations with a scalable, high-performance web proxy appliance designed to secure communications from advanced threats targeting web activity. Symantec Secure Web Gateway solutions draw on a unique proxy server architecture that allows organizations to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience. Get complete visibility into SSL/TLS-encrypted web traffic with Symantec's advanced secure web proxy and cloud security solutions. Symantec Web Isolation prevents websites from delivering zero-day malware, protects users' devices by executing web sessions away from endpoints, and safely sends rendering information to the browser. -
6
Symantec Web Isolation
Broadcom
Symantec Web Isolation executes web sessions away from endpoints, sending only a safe rendering of information to users’ browsers thereby preventing any website-delivered zero-day malware from reaching your devices. When combined with Symantec Secure Web Gateways, policies drive traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk profiles through Isolation for safe browsing. By integrating with Symantec messaging solutions, Web Isolation isolates links in email to prevent phishing threats and credential attacks. Web Isolation protects against emails with links to malicious websites, so they cannot deliver malware, ransomware and other advanced attacks. It also prevents users from submitting corporate credentials and other sensitive information to unknown and malicious websites by rendering pages in read-only mode. -
7
BitLocker
Microsoft
BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM. -
8
A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
-
9
Trellix Data Encryption
Trellix
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized. -
10
Folder Lock
NewSoftwares.net
Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.Starting Price: $39.95/one-time/user -
11
Symantec EDR
Broadcom
Quickly discover and resolve threats with deep endpoint visibility and superior detection analytics, reducing mean time to remediation. Overcome cyber security skills shortages and streamline SOC operations with extensive automation and built-in integrations for sandboxing, SIEM, and orchestration. Fortify security teams with the unmatched expertise and global scale of Symantec Managed Endpoint Detection and Response services. Roll out Endpoint Detection and Response (EDR) across Windows, macOS, and Linux devices using Symantec Endpoint Protection (SEP)-integrated EDR or a dissolvable agent. Supported by deep endpoint visibility, precisely detect and actively hunt threats to quickly expose and fully resolve them, no matter how persistent. Instantly detect advanced attack methods using behavioral policies continually updated by Symantec researchers. -
12
Symantec Integrated Cyber Defense
Broadcom
The Symantec Integrated Cyber Defense (ICD) Platform delivers Endpoint Security, Identity Security, Information Security, and Network Security across on-premises and cloud infrastructures to provide the most complete and effective asset protection in the industry. Symantec is the first and only company to unify and coordinate security. Functions across both cloud and on-premises systems. Symantec enables enterprises to embrace the cloud as it makes sense for them, without sacrificing past investments and reliance on critical infrastructure. We know Symantec will never be your only vendor. That’s why we created Integrated Cyber Defense Exchange (ICDx), which makes it easy to integrate third-party products and share intelligence across the platform. Symantec is the only major cyber defense vendor that builds solutions to support all infrastructures, whether entirely on-premises, entirely in the cloud, or a hybrid of the two. -
13
EncryptUSB
ClevX, LLC
EncryptUSB™ (by ClevX®) is an automatic encryption tool – a portable software application that protects information on the USB drive. Designed to run without installation on a host computer, EncryptUSB operates from the portable drive itself, encrypting every file placed on the drive. Developed with security and compliance in mind for users who transfer sensitive personal information and documents via USB drives, EncryptUSB ensures that the files you put on your drive are encrypted and password protected.Starting Price: $9.96/year -
14
east-tec SafeBit
East-Tec
East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. Your data stays protected even during unexpected shutdowns or crashes. SafeBit is versatile, allowing you to create encrypted vaults on local drives, USB sticks, and other removable media, with options to open them automatically at startup. It also offers extra security features like storing passwords on a USB key, an emergency hotkey to quickly close safes, and a virtual keyboard to prevent keylogging during password entry.Starting Price: $29.95 -
15
SafeConsole
DataLocker
Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.Starting Price: $28 per device per year -
16
Lockystar
Lockystar
Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.Starting Price: $0 -
17
Panda Full Encryption
WatchGuard Technologies
Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console. -
18
Symantec Asset Management Suite
Broadcom
Symantec Asset Management Suite enables organizations to take control, uncover savings, and ensure compliance of IT assets. With an accurate picture of assets throughout their lifecycle, IT can optimize investments, eliminate the purchase of unnecessary software, and avoid penalties and fines due to non-compliance. The Symantec Asset Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. This two-day, instructor-led, hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by AMS to perform its management functions. Students learn how to use AMS software solutions to manage their software, account for and track assets, and to manage license compliance. -
19
WinMagic SecureDoc
WinMagic
SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux). -
20
SecureMFA
SecureMFA
OTP authentication for Microsoft ADFS. It is a module for Microsoft ADFS 2019 or ADFS 2016 servers. It enables ADFS servers to provide multi-factor authentication (MFA) using a Time-Based One-Time Password (TOTP) Algorithm which is based on RFC6238. Using this MFA provider users are required to enter a one time pass-code, which is generated on their phones via authenticator application like Microsoft Authenticator , Google Authenticator, Symantec VIP etc. to complete second factor authentication logon. Self-registration with QR code (using free Microsoft Authentication, Google Authentication, Symantec VIP etc. mobile apps). OTP data storage in MS Active Directory attributes or MS SQL Service. QR secrets encryption with AES 256-bit encryption. Configuration of network locations (IPv4 and IPv6) from which user can scan QR code. Support of ADDS multi-forests trust relationships.Starting Price: $178.25 per year -
21
AnySecura
AnySecura
AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.Starting Price: $216/month -
22
SecureZIP
PKWARE
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement. -
23
Cypherix Secure IT
Cypherix Software
Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.Starting Price: $29.95 -
24
BestCrypt
Jetico
Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them. -
25
Sealit
Sealit Technologies
When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you. -
26
east-tec InvisibleSecrets
East-Tec
east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.Starting Price: $29.95 one-time payment -
27
Salesforce Shield
Salesforce
Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.Starting Price: $25 per month -
28
Symantec Endpoint Protection
Broadcom
Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft. -
29
AxCrypt
AxCrypt
AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.Starting Price: $3.63 per month -
30
OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock devices that are protected by full disk encryption and keep users productive while they work remotely. Ensure that you meet critical industry guidelines and government regulations for protecting customer and patient data. Leverage your experience with ZENworks to reduce the cost of implementing Full Disk Encryption.
-
31
SAV7
SAV7
SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards. -
32
Symantec Storage Protection
Broadcom
Many apps and services running on AWS utilize S3 buckets for storage. Over time, storage can become contaminated with malware, ransomware, and other threats - either from attackers, unwitting users, or other resources. From S3 buckets, threats can propagate to additional apps, users, or databases. Cloud Workload Protection for Storage automatically scan S3 buckets using Symantec’s suite of anti-malware technologies to keep your cloud storage and services clean. Enables secure adoption of containers and serverless technologies such as AWS Lambda. Discovers and blocks the latest threats using Symantec's suite of anti-malware technologies including reputation analysis and advanced machine learning. Industry-leading malware detection and prevention, including Symantec Insight, for fast, scalable, and reliable content scanning. -
33
Powered by the Global Intelligence Network, Symantec WebFilter and Intelligence Services deliver real-time web content protection, security categorization and web application control. The web filtering service automatically filters and categorizes billions of URLs into over 80 predefined categories, including 12 security categories that can be easily managed by IT administrators. When combined with Symantec Secure Web Gateway, including Blue Coat ProxySG, you have the most accurate and granular web application control policy engine for your entire enterprise web filter and cloud access protection. The Advanced Intelligence Services provide additional new services that add more flexibility and options to your webfilters, content control, policy and security management with URL threat risk levels and geolocation.
-
34
Stellar Data Recovery Professional
Stellar Data Recovery Inc.
Stellar Data Recovery Professional restores formatted and accidentally deleted Office documents, emails, photos, videos, audio files, and more in unlimited file formats. The world-renowned DIY software recovers data from all types of Windows storage media, including hard disk drives, solid-state drives, SD cards, and USB flash storage formatted with NTFS, exFAT and FAT file systems. It supports data loss situations involving lost or missing partitions, corruption, and even BitLocker encryption. Further, the tool allows creating a bootable USB recovery media to retrieve data from crashed and unbootable Windows desktops and laptops. With disk imaging and cloning features, the software facilitates fast and secure file recovery from fragmented hard drives having bad sectors. The tool also recovers data from scratched and partially burnt optical media such as CDs, DVDs, HD DVDs, and Blu-ray discs.Starting Price: $89.99 -
35
Symantec Content Analysis
Broadcom
Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further. -
36
Cryptainer Pro
Cypherix Software
Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro allows you to encrypt any file or folder on any Windows PC. Password protect any file or folder with strong Encryption. Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords. A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords for each encrypted file. Just Drag and Drop to hide any data of any kind (documents, pictures, entire folders or even run programs) in a safe password protected vault. Cryptainer's ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. Simple, Secure, Easy-to-Use. Save Encrypted Vaults to Cloud Storage Providers. Runs on all versions of Windows. A must have for every desktop.Starting Price: $69.95 -
37
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance. -
38
Cryptomator
Skymatic GmbH
Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all. -
39
ZevaCrypt
ZevaCrypt
Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.Starting Price: $9.90 per month -
40
ClickSSL
ClickSSL
ClickSSL is an platinum partner of the leading Certificate Authorities like VeriSign(now Symantec), GeoTrust, RapidSSL, Thawte and Comodo. ClickSSL offers EV SSL, Code Signing Certificate, UCC Certificate, Wildcard SSL & more SSL Certificates at market low price. ClickSSL offers SSL certificates can provide you with non-forgettable proof of your website's identity, and customer confidence in the integrity and security of your online business. Buy RapidSSL, VeriSign(now Symantec), GeoTrust, Thawte and Comodo SSL Certificates at affordable price. ClickSSL offers SSL certificates with strong 256 bit encryption at affordable price to secure your web sites, eCommerce, exchange, intranets and extranets. Our inexpensive digital certificate is supported by over 99% of current browsers. Buy SSL certificate at lowest price to establish secure environment on your site(s). Move your step ahead with HTTPS and never let down customer’s confidence.Starting Price: $13.21 -
41
The SSL Store
The SSL Store
Build trust and protect your brand with leading encryption, identity & website security solutions. Trust is everything. And, that's never been more true than in today's world, where there are now over 4 million data breaches per day. So, how do you ensure that your credibility, integrity, reputation and trustworthiness aren't at risk? Implement proper encryption, identity and security protections that users can see and feel. When consumers trust your security, they trust your brand. A trusted brand always wins. So, let's inspire trust together. Better certificate management must be a priority for 2020. The risks are undeniable, today every company needs visibility, control and automation to keep up with the demands of digital certificate security. As the world's foremost provider of SSL security certificates, The SSL Store™ is one of the largest Platinum Partners of the world's leading Certification Authorities (CAs), including Symantec, GeoTrust, Thawte, RapidSSL, Certum and Comodo. -
42
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
43
Dell Data Protection | Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. Exclusive to select Dell Latitude, OptiPlex and Dell Precision systems, the optional Full Volume Encryption* solution equips end-user systems with military-grade protection that won’t slow your employees down.
-
44
Conjurers Encrypter
Brainasoft
Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing. -
45
DropSecure
DropSecure
With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.Starting Price: $10 per month -
46
Xecrets Ez
Axantum Software AB
Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.Starting Price: €15/year -
47
iBoysoft DiskGeeker
iBoysoft
iBoysoft DiskGeeker is a feature-rich disk management utility that was released to help users manage their drives (external hard drives, USB flash drives, flash drives, etc.), map network drives with different protocols, use FileVault or BitLocker to encrypt disks, check and repair disk errors, clean drives, clone drives, test disk speed, back up APFS volumes, and read and write to NTFS drives and BitLocker encrypted drives on Mac. With the help of iBoysoft DiskGeeker, Mac users can't only enjoy cross-platform disk utilization, enhance data security, boost their system performance, but can also raise their work productivity. Supported Operating Systems: macOS 14 (Sonoma), macOS 13 (Ventura), macOS 12 (Monterey), macOS 11 (Big Sur), macOS 10.15 (Catalina), macOS 10.14 (Mojave), and macOS 10.13 (High Sierra)Starting Price: $39.95 -
48
Steganos Data Safe
Steganos
Steganos Data Safe is a secure, future-oriented digital vault that lets users create encrypted safes in minutes and store all kinds of sensitive files with strong, state-of-the-art 256-bit AES-GCM encryption accelerated via AES-NI. Safes automatically scale in size without wasting space, can be synchronized with cloud services (auto-detecting Dropbox, Microsoft OneDrive, Google Drive, and any other cloud), and support shared network safes that allow simultaneous write access by multiple users. Integration exposes opened safes as drives usable from any program, including on ARM devices, and portable safes can be created on USB sticks or optical media, so data remains protected even if the carrier is lost. Security is bolstered with TOTP two-factor authentication using standard apps (Authy, Microsoft Authenticator, Google Authenticator), a live password quality and entropy indicator.Starting Price: $29.95 per month -
49
Ubiq
Ubiq Security
Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.Starting Price: $0.001 per encrypt -
50
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.