DESwrap

DESwrap

Data Encryption Systems
SecureZIP

SecureZIP

PKWARE
+
+

Related Products

  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Proton VPN
    41,009 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Hotspot Shield
    121 Ratings
    Visit Website
  • SureSync
    13 Ratings
    Visit Website
  • iPlum
    9,124 Ratings
    Visit Website
  • Cloudflare
    1,915 Ratings
    Visit Website

About

The DK2 and DK3 can be used in conjunction with our DESwrap software to give instant protection to .EXE and .DLL files. This is achieved by wrapping a protective shield around the application using encryption techniques designed and tested during the past 25 years to provide a very secure operating environment for your software. The Down Counter within the DESkey may be called from DESwrap. This feature provides the means to stop your software working after a pre-programmed number of executions. An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.

About

Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone looking for a protective encryption shield solution to provide instant protection to their software

Audience

Encryption solution for developers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Data Encryption Systems
Founded: 1985
United Kingdom
des.co.uk/products/deswrap

Company Information

PKWARE
Founded: 1986
United States
www.pkware.com

Alternatives

Alternatives

StealthDisk Mobile

StealthDisk Mobile

Security Group Six
Salesforce Shield

Salesforce Shield

Salesforce
SecureZIP

SecureZIP

PKWARE

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

No info available.

Integrations

No info available.
Claim DESwrap and update features and information
Claim DESwrap and update features and information
Claim SecureZIP and update features and information
Claim SecureZIP and update features and information