Alternatives to Cypherix Secure IT
Compare Cypherix Secure IT alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cypherix Secure IT in 2026. Compare features, ratings, user reviews, pricing, and more from Cypherix Secure IT competitors and alternatives in order to make an informed decision for your business.
-
1
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022. -
2
Tresorit
Tresorit
End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shieldStarting Price: $10.42/month -
3
east-tec InvisibleSecrets
East-Tec
east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.Starting Price: $29.95 one-time payment -
4
SAV7
SAV7
SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards. -
5
Cryptainer Pro
Cypherix Software
Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro allows you to encrypt any file or folder on any Windows PC. Password protect any file or folder with strong Encryption. Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords. A single password allows access to the virtual disk, thereby eliminating the need to remember separate passwords for each encrypted file. Just Drag and Drop to hide any data of any kind (documents, pictures, entire folders or even run programs) in a safe password protected vault. Cryptainer's ease of use and deployment coupled with its speed and versatility makes it an ideal security tool for all environments. Simple, Secure, Easy-to-Use. Save Encrypted Vaults to Cloud Storage Providers. Runs on all versions of Windows. A must have for every desktop.Starting Price: $69.95 -
6
east-tec SafeBit
East-Tec
East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. Your data stays protected even during unexpected shutdowns or crashes. SafeBit is versatile, allowing you to create encrypted vaults on local drives, USB sticks, and other removable media, with options to open them automatically at startup. It also offers extra security features like storing passwords on a USB key, an emergency hotkey to quickly close safes, and a virtual keyboard to prevent keylogging during password entry.Starting Price: $29.95 -
7
Encrypto
MacPaw
Encrypto takes any file or folder and adds AES-256 encryption to it. With encryption, you know your file is incredibly secure and that only the right person can access it. Rather than relay a password to the recipient, include a unique, embedded password hint that only they would be able to decipher. Send encrypted files via email, Messages, AirDrop, Dropbox, carrier pigeon with USB stick — however you send them, your files are protected. With Encrypto, not only can you encrypt and share files, but you can also save them to your own disk. Select your files, put them through Encrypto, and voilà — they’re protected. If you haven’t been living on Mars these last years, having a data encryption strategy is a must. Let Encrypto be part of it. It's easy to use and impossible to hack. Download and give it a spin right now. -
8
Symantec Endpoint Encryption
Broadcom
Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients. -
9
A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
-
10
Folder Lock
NewSoftwares.net
Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a safe, would you like to keep your files in a digital ‘Locker’ that’s safer than a bank’s vault? You can create ‘Locker(s)’ which are protected by AES 256-bit encryption. You need not encrypt or decrypt files when accessing; simply copy them to Locker and voila! They are encrypted on the fly. Folder Lock offers a 2-way encryption and backup method, letting you backup your encrypted ‘Lockers’ online.Starting Price: $39.95/one-time/user -
11
Xecrets Ez
Axantum Software AB
Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.Starting Price: €15/year -
12
Conjurers Encrypter
Brainasoft
Conjurers encrypter 4 or simply CE 4 is a powerful and easy to use freeware file encryption utility. It can be used to encrypt files and folders easily and secure your important and confidential data. Encryption is the process of encoding information so that is cannot be accessed by others unless they have the secret key. CE is normally used to protect sensitive documents, but encryption is also a good way to stop people from looking at your personal stuff. You can also send important file(s) after encrypting it to others over the internet without worrying about the contents being read by anybody other than the recipient even bypassing attacks like Network Sniffing. -
13
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database. -
14
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
15
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. -
16
Lockystar
Lockystar
Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.Starting Price: $0 -
17
AnySecura
AnySecura
AnySecura is an enterprise-grade information security solution that helps organizations protect sensitive data, manage digital assets, and monitor user activity from a unified platform. By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.Starting Price: $216/month -
18
ZevaCrypt
ZevaCrypt
Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.Starting Price: $9.90 per month -
19
SecureZIP
PKWARE
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement. -
20
AxCrypt
AxCrypt
AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.Starting Price: $3.63 per month -
21
IceIT
Quantum Knight
IceIT is an always-free desktop utility for encrypting files quickly and easily using quantum-strength encryption. In addition to the community edition, IceIT includes available commercial upgrades for creating always-on sharing and private networks that allow securing files and folders across multiple users and groups, without the need for a centralized cloud account. IceIT frees you to confidently use your email, text message, and legacy communication mediums without worry. Got backups that you want to protect? Just IceIT!Starting Price: $0 -
22
Cryptomator
Skymatic GmbH
Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service. Take the security of your data into your own hands. Cryptomator is a simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all. -
23
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance. -
24
SalaX Secure Collaboration is an all-in-one solution that makes it easy to encrypt emails, messages, chat rooms, and audio/video communications for privacy, compliance, and record-keeping. It includes SalaX Secure Messaging and SalaX Secure Mail, providing secure channels for sharing confidential, restricted, or secret information. Developed with a security-first mindset, SalaX Secure Collaboration offers full audit trails and flexible deployment options, allowing organizations to maintain control over their data. Encrypted video conferencing, files and file sharing, calls, and messages. We secure all your critical communications. Meet data sovereignty requirements with public cloud, private cloud, or on-premises deployments. Send messages without leaving a trace on public servers. Control your own encryption keys. Regular email or chat services allow attachments with up to 30MB of data to be sent. With our solution, the limit is 1GB.
-
25
EncryptUSB
ClevX, LLC
EncryptUSB™ (by ClevX®) is an automatic encryption tool – a portable software application that protects information on the USB drive. Designed to run without installation on a host computer, EncryptUSB operates from the portable drive itself, encrypting every file placed on the drive. Developed with security and compliance in mind for users who transfer sensitive personal information and documents via USB drives, EncryptUSB ensures that the files you put on your drive are encrypted and password protected.Starting Price: $9.96/year -
26
Sealit
Sealit Technologies
When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you. -
27
GhostVolt
GhostVolt Ltd
GhostVolt is a security App which protects your privacy and stops unauthorised access to your files and folders and helps fight against cybercriminals who want to steal your data and use it for identity theft, ransomware, blackmail, and other criminal attacks. With GhostVolt, you can secure all your personal files including your health records, photos, movies, tax returns or any other document so you’re in control of who has access to your files and data, all the time. All your files are automatically encrypted with industry standard 256 AES encryption and because it works just like your regular file manager, you already know how to use it. GhostVolt works perfectly with Microsoft OneDrive and allows you to automatically backup and sync your protected files across your computers, you also get an integrated secure note manager, secure file sharing, file comments and tagging and so much more.Starting Price: $20 per year -
28
Cubbit for Teams
Cubbit
Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.Starting Price: €6 per user, per month -
29
Trellix Data Encryption
Trellix
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized. -
30
DropSecure
DropSecure
With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.Starting Price: $10 per month -
31
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
32
WinMagic SecureDoc
WinMagic
SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux). -
33
Steganos Data Safe
Steganos
Steganos Data Safe is a secure, future-oriented digital vault that lets users create encrypted safes in minutes and store all kinds of sensitive files with strong, state-of-the-art 256-bit AES-GCM encryption accelerated via AES-NI. Safes automatically scale in size without wasting space, can be synchronized with cloud services (auto-detecting Dropbox, Microsoft OneDrive, Google Drive, and any other cloud), and support shared network safes that allow simultaneous write access by multiple users. Integration exposes opened safes as drives usable from any program, including on ARM devices, and portable safes can be created on USB sticks or optical media, so data remains protected even if the carrier is lost. Security is bolstered with TOTP two-factor authentication using standard apps (Authy, Microsoft Authenticator, Google Authenticator), a live password quality and entropy indicator.Starting Price: $29.95 per month -
34
Gilisoft #1 All-in-One Toolkit Suite
Gilisoft
22 Powerful and Useful Software in One Pack, which including Video Converter, Video Editor, Screen Recorder Pro, Slideshow Movie Creator, Movie DVD Converter, Movie DVD Copy, Movie DVD Creator, Audio Converter Ripper, Audio Recorder Pro, Audio Editor, MP3 CD Maker, File Lock Pro, USB Encryption, Secure Disc Creator, Full Disk Encryption, Private Disk, USB Lock, and RAM Disk, Image Watermark Remover, Video Watermark Remover, Formathor, Data Recovery. #1 All-in-One Toolkit Suite is able to do almost every multimedia ripping, converting, burning, and editing imaginable. You can make your PC perfectly safe with encryption tools, get back lost files and also speed up your PC performance with RAMDisk. In conclusion, you can do almost multimedia work with audio and video tools, and you can do encryption operation with encryption software. Just free download and experience it now!Starting Price: $149.99 -
35
pcInformant
pcInformant
Free Keylogger with real-time screenshots of user activity. Remotely monitor a computer. Track internet activity, applications, keystrokes, and receive HTML reporting via email. Spy Software for Windows. Monitoring Options: Free Keylogger Free Screenshots Free Internet Logs Free Application Logs HTML Reporting Log Files can be Emailed Special Features: Application is invisible Logs can be cleared automatically Features can be turned on and off Full Suite of Options Application is not listed in Add / Remove Programs Security Features: Application is invisible, database is encrypted, and emails are sent via encrypted password protected zip files. pcInformant does not store any data in the cloud. All data is stored on your computer, so your information is safe. Requirements: Windows 7, 8, 9, 10, or 11Starting Price: FREE -
36
Boxcryptor
Boxcryptor
Boxcryptor protects your company data in the cloud: in OneDrive, SharePoint, Dropbox, Google Drive, and more. Boxcryptor encrypts your files directly on the device, therefore the data is encrypted and secured before it is moved to the storage of your choice. Boxcryptor is available on Windows, macOS, iOS, and Android. Work cross-platform without limitations. Boxcryptor adds security to over 30 cloud providers. Protect your NAS, file servers, and local data as well. Boxcryptor ensures the confidentiality of information while the cloud provides availability and a backup option. Boxcryptor has been audited by the security experts at Kudelski Security. The quality and security of the software is verified. Optionally confirm sign-ins on a second device with 2FA. Manage users more easily with SSO, SCIM, or Active Directory support. Collaborate securely with Boxcryptor, in your own team, or with partners, thanks to group features, our Microsoft Teams encryption, or Whisply. -
37
Ubiq
Ubiq Security
Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.Starting Price: $0.001 per encrypt -
38
Atakama
Atakama
One-of-a-kind information security solution designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to fit your business needs and user workflows. Whether protecting from external or internal threats, securing confidential data is always a top priority. Atakama lets you protect sensitive information such as earnings reports, PII, HR records, M&A deal documents, engineering and scientific data, internal memoranda, investment models, and much more. There's an ever-increasing need for individual file-level encryption. State and federal cybersecurity regulations are expanding and becoming increasingly more onerous. Ransomware attacks that involve file theft and publication can devastate any organization. With Atakama, files are always client side encrypted so it's always the encrypted version of the file that lives in the cloud or on the server. -
39
WinGPG
Scand
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations: - Encryption/Decryption (we offer automatic zipping at encryption time, so your files are ready to be transmitted via email or any instant messenger immediately) - Signature/Verification - Key management (create, import, export, revoke) WinGPG main operational features are: - WinNT Explorer support via context menus - Global shortcuts working from the active explorer window or clipboard - Clipboard support for both texts and files - No complicated setup, you only run a batch file WinGPG is a fully functional tool, which offers the user an opportunity to manage keys and files easily. Password protected keys, default keys, and other useful tricks are available with WinGPG. -
40
StealthDisk Mobile
Security Group Six
StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.Starting Price: $49.95 one-time payment -
41
SWISS SECURIUM
ALPEIN Software SWISS AG
SWISS SECURIUM is a cloud-based, all-in-one solution designed to provide highly secure collaboration and encrypted communication for businesses. Hosted exclusively in Switzerland, the platform ensures that all data remains encrypted and accessible only to authorized users, adhering to the country's stringent data protection standards. Key features include wiretap-proof voice and video telephony, an encrypted instant messenger supporting multi-user chats and file transfers, a dedicated email service, seamless data exchange capabilities, and a convenient password manager. The platform also offers optional remote desktop access and a video conference tool, all integrated into a user-friendly interface. Administrators benefit from a simple management interface for user administration, access rights, policies, VPN configurations, and two-factor authentication. Designed to meet the needs of small and medium-sized enterprises and larger organizations.Starting Price: $188.55 per month -
42
Polar Crypto Component
Polar Software
Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. In all applications developed for conducting business transactions, where absolute confidentiality is needed. For digital signature creation and validation. In e-commerce web site applications that store sensitive information such as clients’ credit card details. In desktop applications that encrypt confidential files on your computer or computer network.Starting Price: $239.00/one-time/user -
43
RMail
RPost
RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.Starting Price: $7/month/user -
44
JM-Crypt
JM-Crypt
Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.Starting Price: $2.99 (Android) - $9.99 (PC) -
45
WinZip SafeShare
WinZip
A modernized sharing experience. Share your files with confidence and security in an intuitive environment built with simplicity in mind. This powerful sharing tool allows you to share, compress, and encrypt, all within a simple interface. Easily share files to one or many locations, surrounded by extra layers of security, including military-grade encryption and time bomb capabilities. Enjoy expanded cloud services, including OpenStack and SwiftStack regions and credential files, Alibaba, Wasabi, HP, Oracle, Azure, WebDAV, CenturyLink, IONOS and OVH cloud providers. Combine multiple PDF files into a single PDF file to save, zip, or share. Streamline workflow when sharing via Slack IM. Manage files shared by WinZip or ZipShare. Open and view, share again or remove shared files. Keep track of which Zip files you have shared via WinZip or ZipShare. Email anyone directly from WinZip by adding contacts from all your supported sources into one combined address book.Starting Price: $34.95 one-time payment -
46
SendSafely
SendSafely
The end-to-end encryption platform for modern business. SendSafely lets you easily exchange encrypted files and information with anyone on any device. Let us take the headache out of secure file exchange. Trusted by leading brands that understand the importance of keeping customer information safe. SendSafely works natively with all major browsers. No software to install, no encryption keys to manage. Use SendSafely for compliance with regulations like HIPAA (BAA available), GDPR, CCPA and more. Use one of our pre-built platform connectors or easily create your own integration with our developer API. Features designed for businesses such as user administration, single sign on and custom branding. SendSafely integrates with many popular third party systems, adding end-to-end encryption to the platforms your users already know and love. Extend the capabilities of your existing apps and infrastructure by seamlessly adding encryption to your existing workflows.Starting Price: $11.50/user/month -
47
Panda Full Encryption
WatchGuard Technologies
Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console. -
48
OpticalBackup
OpticalBackup
OpticalBackup is a secure, long-term way to protect important data. Files are encrypted and written to tamper-proof optical discs designed to last for decades—offline, immutable, and safe from ransomware or deletion. The process is simple and fully automated. Upload your files, and OpticalBackup handles the rest: burning, labeling, and either storing your discs in a secure facility or shipping them to you. No hardware, scripts, or manual steps needed. Discs can’t be altered once written, ensuring data integrity over time. Ideal for critical files like legal records, personal archives, creative work, or sensitive business data. Flexible subscription plans include cloud access, encryption, and storage or delivery options. OpticalBackup also supports the 3-2-1 backup rule, adding a physical, offline layer to your strategy. Preserve what matters most—with confidence it’ll still be there in decades.Starting Price: $33/month -
49
BestCrypt
Jetico
Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them. -
50
Fabasoft Secomo
Fabasoft
Fabasoft Secomo is an encryption architecture with true end-to-end encryption. Encryption takes place at the workplace or mobile device and not in the cloud. This ensures end-to-end encryption from the sender to the receiver. The Fabasoft credo "Continuous protection through encryption" means that only you have access to the Fabasoft Secomo and your settings. Fabasoft has neither interfaces to the appliance nor your keys. Fabasoft Secomo is an appliance consisting of Fabasoft Secomo software and two highly available servers in a network. The servers have hardware security modules that meet the requirements of FIPS 140-2 Level 4 certification for physical security. Fabasoft Secomo supports client certificates for authentication. You decide who has access to the security appliance and may work with encrypted documents. Fabasoft Secomo enables simple operation and has its own management user interface.