Alternatives to RightsManager

Compare RightsManager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to RightsManager in 2026. Compare features, ratings, user reviews, pricing, and more from RightsManager competitors and alternatives in order to make an informed decision for your business.

  • 1
    Psono

    Psono

    esaqa GmbH

    Psono is a self-hosted, open-source password manager designed to safeguard your data. It encrypts and stores your credentials, ensuring only you have access. You can also securely share encrypted access with your team. With a rich set of features, Psono makes data management and password retrieval simpler than ever. Its robust security includes client-side encryption for genuine end-to-end password sharing, supplemented by SSL and storage encryption. The entire code is open for transparent public auditing, emphasizing that true security lies in proper encryption rather than concealing flaws. Hosting Psono on your server offers enhanced access control, eliminating the need to depend on public services for data storage. Psono stands out as one of the most secure password managers, prioritizing the online safety of its users on their servers.
  • 2
    Locklizard Safeguard PDF Security
    Locklizard protects PDF files and other digital documents from piracy, leakage and misuse. We stop unuauthorized access to documents and control how authorized users can use them. Stop theft of confidential and sensitive information, intellectual property, trade secrets, training courses, reports, ebooks, etc. Share and sell documents securely, stop data leakage and enforce compliance. Lock documents to devices and locations, dynamically watermark content, control expiry, stop printing, editing, copying and screen grabbing, and revoke access at any time. Track how your documents are being used. Locklizard uses strong US Gov strength encryption, DRM and licensing controls to ensure your documents remain fully protected at all times regardless of their location.
    Starting Price: $500.00/month
  • 3
    PDFEncrypt

    PDFEncrypt

    PDFEncrypt

    PDFEncrypt is a free, open source utility to encrypt PDF files using standard PDF encryption algorithms. When a document is encrypted, its contents become unreadable. An authorized user can decrypt the document to obtain access to the contents. If a PDF document is encrypted with a password, the user must specify the password before the document can be viewed in Adobe Reader or Adobe Acrobat. PDFEncrypt provides a means to encrypt any standard PDF document for free, without the need to purchase the Adobe Acrobat software or upload your confidential PDF files to a third-party server for encryption. The app runs directly on your Windows PC and allows you to specify a password (required to open the document) as well as many options and permissions to apply to the PDF file.
  • 4
    Treeno Document Management
    Treeno Document Management has all the features and functions of an enterprise-class electronic document management system without the high cost. Treeno Document Server Software provides storage and electronic document management of all files. Treeno’s industry-standard SSL security ensures that all information is encrypted during transmission. Treeno also protects access to your organization’s information by employing a comprehensive security model based on user and group permissions. All documents and activities that take place in the system are fully audited. The Document Server’s built-in ability to generate and recognize barcodes automates workflows and processing of scanned items. Filing structure, metadata, and document type fields are easily set up and configured by system administrators without any IT involvement. Treeno Document Management Cloud, also known as Treeno Document Management SaaS.
    Starting Price: $50 per month
  • 5
    Investintech PDF Library SDK

    Investintech PDF Library SDK

    Investintech PDF Solutions

    Seamlessly integrate robust PDF editing, parsing and rendering functionalities into your projects with PDF library SDK. Multi-platform shared library (dll, so and dylib) with C-compatible interface. C#.Net, Python, Java 8, C++ 11, libraries/modules. APIs for Linux, Windows, and Mac. Numerous interface functions for transforming and creating new content for PDF files, providing a huge variety of options and broad flexibility for implementation tailored to the specific needs of your project. Efficient utilization of multi-core CPUs for stream decoding and content rendering purposes achieved by closely following portable document format specification guidelines. Apply electronic signatures (with or without cryptographic security layer). PDF encryption & decryption (a password-based encryption handler). Document structure manipulation (create, delete, move, insert, extract, resize, and rotate pages).
  • 6
    Matrix

    Matrix

    The Matrix.org Foundation

    An open network for secure, decentralized communication. Matrix is an open source project that publishes the Matrix open standard for secure, decentralized, real-time communication, and its Apache licensed reference implementations. Matrix gives you simple HTTP APIs and SDKs (iOS, Android, Web) to create chatrooms, direct chats and chat bots, complete with end-to-end encryption, file transfer, synchronized conversation history, formatted messages, read receipts and more. Matrix provides state-of-the-art end-to-end-encryption via the Olm and Megolm cryptographic ratchets. This ensures that only the intended recipients can ever decrypt your messages, while warning if any unexpected devices are added to the conversation. Matrix owes its name to its ability to bridge existing platforms into a global open matrix of communication. Bridges are core to Matrix and designed to be as easy to write as possible, with Matrix providing the highest common denominator language to link the networks.
  • 7
    FormatPDF

    FormatPDF

    FormatPDF

    FormatPDF is a website that provides a variety of online tools for working with PDF documents. These tools include PDF conversion, merging and splitting, compression, encryption and decryption, as well as editing and annotating PDF files. With FormatPDF, users can easily convert a wide range of document formats to PDF, including Word, Excel, PowerPoint, and image files. The website also allows users to merge multiple PDF files into a single document, or to split a large PDF into smaller ones. In addition to conversion and manipulation tools, FormatPDF.com offers features for improving the quality and security of PDF documents. The website includes tools for compressing PDF files, which can reduce the size of large documents for easier sharing and storage. Users can also encrypt PDF files with passwords to restrict access, or decrypt protected files if they have the necessary credentials.
    Starting Price: $4.90/month
  • 8
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 9
    PDF Master

    PDF Master

    PDFMaster.app

    PDF editor made for modern work. Simple to Convert, Easy to Edit. Manage all your PDF documents in one place. Open PDF Master and drop the PDF file you want to modify. Add elements (text, images, etc.) using the editor. Approve the modified document, download or share it. With advanced encryption our converter ensures that your sensitive data remains protected throughout the conversion process. Don't worry about your privacy, we protect you with industry-standard security. No need to download any apps or extensions. Convert files on desktops, laptops, tablets, smartphones, and popular operating systems, including Windows, macOS, iOS, and Android. Convert files anywhere, at any time, on any device using just your browser. No technical knowledge is required. Upload or drag&drop your file to the platform, choose the format, edit it as you want, and we will do the rest.
  • 10
    Confide

    Confide

    Confide

    Confide uses industry-standard end-to-end encryption to keep your messages safe and to ensure they can only be read by the intended recipients. Messages disappear forever after they are read once, making them as private and secure as the spoken word. Confide’s patented ScreenShield technology keeps your communication safe by preventing screenshots of your messages. Confide utilizes industry-standard cryptography to keep your messages safe and secure. We combine this with a simple and intuitive user experience to provide superior security, with no configuration required. All messages between Confide users are end-to-end encrypted. Encryption keys are generated locally on each device and the private key never leaves the device, ensuring that only the intended recipients can read your messages. All communication goes through Transport Layer Security (TLS), preventing any possible man-in-the-middle attack and providing yet another layer of security, privacy, and data integrity.
    Starting Price: $4.99 per user per month
  • 11
    SilicaCAD
    SilicaCAD Professional is a 2D/3D DWG-native CAD for general-purpose drafting. The program is original and based on 22 years’ of CAD experience (since 1999), SilicaCAD offers very high compatibility with AutoCAD® offers more advanced features and exclusive tools essential. The best solution for AEC, and MCAD in all sectors of CAD use. SilicaCAD is the best economic solution, it is a perpetual licensing with more Extra CAD functions at a fraction of the cost of other CADs software. DWG is the same AutoCAD’s file format, so when you open an existing DWG file with SilicaCAD, there’s no file conversion and no data loss. We provide industry-standard compatibility with AutoCAD®, which means you can get to work immediately using DWG files, commands, fonts, blocks, hatches, and Linetypes. You can finally buy a DWG-compatible ACAD at an extremely affordable price.
    Starting Price: $350 per user
  • 12
    pdfRest API Toolkit Self-Hosted
    pdfRest API Toolkit Self-Hosted is available on the AWS Marketplace and can be spun up in just a few clicks. Self-host a production ready server to integrate the PDF processing API Toolkit into your own service or to automate your internal document workflow. Watermark PDF, Add to PDF, Query PDF, Convert to PDF, PDF to Images, Convert PDF Colors, Convert to PDF/A, Convert to PDF/X, Compress PDF, Linearize PDF, Flatten Annotations, Flatten Layers, Flatten Transparencies, Merge PDFs, Split PDF, Encrypt PDF, Decrypt PDF, Restrict PDF, Extract Text, OCR PDF, Upload Files, Zip Files. Maintain full control with a dedicated EC2-based RESTful API with scalable performance to meet your needs. Built with Adobe PDF Library, the same technology that powers Adobe Acrobat, and developed by Datalogics, globally-trusted document processing experts for over 50 years, pdfRest has the gold-standard API Toolkit for high-quality PDF processing.
    Starting Price: $0.242 per hour
  • 13
    FileAgo

    FileAgo

    FileAgo Software Services

    FileAgo is the world's only software to have a combination of Waterfall and Granular Permission model, which enables users to implement precise access control and restriction over their data like never before. Organizations and users get the best of both worlds in FileAgo - control and ease of use. Manage data of your teams at a centralised storage on cloud, while securely allowing/restricting access and file sharing. Co-edit office documents with your co-workers in real-time using our builtin Collabora Online editor or Microsoft Office for the web. Our top priority is always to protect your sensitive files, and FileAgo's unique and flexible granular file and folder permission model is designed just for that. Also, the data is encrypted using AES-256 encryption and stored in datacenters which has passed various industry compliances and security certifications.
    Starting Price: $4 per user per month
  • 14
    Ubiq

    Ubiq

    Ubiq Security

    Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.
    Starting Price: $0.001 per encrypt
  • 15
    Ultiboard
    Ultiboard is printed circuit board design and layout software that integrates seamlessly with Multisim to accelerate PCB prototype development. Ultiboard software offers efficient PCB design layout and routing with a customizable environment. You can use its flexible tools to place parts and copper with manual precision to define critical board elements. With its automated functionality, you can quickly complete a design. The advanced spreadsheet view, toolbox, and design wizards help you easily manage, control, and define any board layout. Seamless integration with Multisim software provides simple schematic transfer to PCB, and forward and backward annotation ensures design iteration management. You can easily export industry-standard file formats such as Gerber and DXF to complete the design flow from schematic to layout. From data and automation to research and validation, our tailored, software-connected approach is rooted in helping you engineer what’s next.
    Starting Price: $ 2,816
  • 16
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 17
    PrimoPDF

    PrimoPDF

    Nitro Software

    Create PDF files with the world's most popular free PDF creator. With just one click, turn virtually any kind of file into a 100% industry-standard PDF. Convert almost any kind of file into a 100% industry-standard PDF file with one click. Tap into the full power of your document stack with just a few clicks. Nitro effortlessly converts PDFs into editable Word, Excel, PowerPoint or other Microsoft office formats – so you can spend less time sifting through old documents and more time working on new ideas. Need to convert your file back to PDF? Nitro PDF Pro makes that simple, too. Make your documents work harder for you. With Nitro you can create PDFs on any program and any device – so you can say goodbye to formatting headaches, and devote your time to creating exceptional content.
  • 18
    Secure My Files
    Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script into the page. You can encrypt or decrypt a file, providing a password. Source code is available on Github for everyone to inspect. Anyone can detect issues and contribute, improving security. We and our servers are based in Europe. Build and host your own flavor of Secure My Files. Reuse as a library in your own application.
    Starting Price: $14.99 one-time payment
  • 19
    Nimbus Portal Solutions

    Nimbus Portal Solutions

    Nimbus Portal Solutions

    Securely share documents with staff and clients – Nimbus implements the world’s best data security software features and best practices for your security and protection, including both physical security and electronic security measures committed to industry standards such as ISO 27001 (Information Security Management) and ISO 32000 (Document Management). All the transmission of file data and metadata occurs over encrypted channels (https) thanks to our file security software features that you won’t be able to experience anywhere else. Nimbus is hosted and replicated across a multitude of secure, world class data centres that are locally hosted in each region, giving customers optimal confidence in the performance of our file protection system. User files are only accessible by people who possess the appropriate logins to a valid URL, with self-managed unique logins providing complete privacy of your dedicated login details.
    Starting Price: $22.50 per month
  • 20
    Concealer

    Concealer

    BeLight Software

    This reliable encryption Mac software stores information in the form of cards and uses industry-standard methods of data encryption (AES-256) to protect your credit card numbers, website passwords, software license codes, confidential files and photos, and much more. This password manager comes with card templates that make it quick and easy to store credit card details, passwords and login information, software serial numbers. Just choose a category and copy your data into the fields. Without your master password, no one will ever be able to find this encrypted data. Our encryption software not only hides your files, but also protects them by putting them in a sparse bundle with AES-256 encryption. Use only the master password or assign a separate password for each file vault to double the protection. Adding files is as simple as dragging and dropping them from the Finder.
    Starting Price: $19.99 one-time payment
  • 21
    FileMarket

    FileMarket

    FileMarket

    FileMarket.xyz is a next‑generation Web3 file‑sharing and marketplace platform that allows users to tokenize, store, sell, and swap digital files as NFTs using its Encrypted FileToken (EFT) standard, offering complete on‑chain programmable access and tokenized paywalls. Built on Filecoin (FVM/FEVM), IPFS, and multi‑chain support (including ZkSync and Ethereum), it provides perpetual decentralized storage, user‑controlled privacy, and lifelong access via smart contracts. Files are encrypted and stored symmetrically on Filecoin via Lighthouse; creators mint an NFT that encapsulates the encrypted content and set access terms. Buyers reserve funds in a smart contract, share their public key, and upon purchase receive an encrypted decryption key, downloading and decrypting the file. A backend listener and fraud‑reporting system ensures only correctly decrypted files complete a sale, and ownership transfers trigger secure key exchanges.
  • 22
    Red Hat Ceph Storage
    Red Hat® Ceph Storage is an open, massively scalable, simplified storage solution for modern data pipelines. Engineered for data analytics, artificial intelligence/machine learning (AI/ML), and emerging workloads, Red Hat Ceph Storage delivers software-defined storage on your choice of industry-standard hardware. Scale to unprecedented levels, up to 1 billion objects and beyond, without compromising on performance. Expand or shrink storage clusters with no downtime. Gain the agility you need to get to market faster. Start faster with dramatically simplified installation. Quickly gain insights from massive amounts of unstructured data with streamlined operation, monitoring, and capacity management. Safeguard your data from outside threats and hardware failures with integrated data protection and data security features, including client-side and object-level encryption. Easily handle backup and recovery with a single point of control and administration.
  • 23
    SBC Software Edition (SBC SWe)

    SBC Software Edition (SBC SWe)

    Ribbon Communications

    The Ribbon SBC Software Edition (SBC SWe) is a cloud-native, software-based Session Border Controller designed to secure and optimize real-time communications across various deployment environments. It offers the same robust features as Ribbon's hardware-based SBC 5400 and SBC 7000 appliances, including extensive audio codec transcoding, signaling interworking, call admission control, and comprehensive security measures such as encryption and protection against Denial of Service attacks. The SBC SWe can be deployed as a Virtual Machine (VM) on industry-standard servers in data centers, as a Virtual Network Function (VNF) in private clouds using OpenStack, or in public clouds like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This flexibility allows enterprises to scale their communications infrastructure efficiently while maintaining high performance and security standards.
  • 24
    DRACOON

    DRACOON

    DRACOON

    Project managers can create data rooms independently and assign authorizations, which relieves the IT department and departments can work more effectively and efficiently. File duplicates are prevented because all employees in DRACOON data rooms have access to the latest documents at all times and can work on files together with internal and external employees. User rights and approval/file request deadlines for easy project coordination. GDPR-compliant sending of encrypted file attachments or complete emails via DRACOON for Outlook. Rely on end-to-end encryption, which also includes client-side encryption. Only it offers maximum protection for your data. With this type of encryption, not even an admin or DRACOON as the operator can decrypt your data, because the key remains with the owner at all times. Many other providers handle this differently.
  • 25
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.
    Starting Price: $29.95 one-time payment
  • 26
    Aurora Files

    Aurora Files

    Afterlogic Corp

    Your files in your cloud on your rules. Aurora Files is an open-source file storage platform for small teams and personal users. Self-hosted on your infrastructure, you stay in control over your data. Share files and folders with your teammates. As a backend, can use server's local or remote S3-compatible storage. Access your data with any WebDAV client, including the standard Windows Explorer. Rebrand Aurora Files with your colors, styles and images (including mobile apps). Access your files from any device, iOS or Android. Enables two-way sync of a user's local folders and the cloud, for both personal and corporate storage. Enable access to folders and files for everyone with the link. Handy for developers, makes it easier to customize code, perform integration with other systems, create and maintain your plugins. Aurora Files includes Paranoid Encryption module which provides strong AES-256 browser-based encryption.
    Starting Price: $499 per year
  • 27
    Crait

    Crait

    Crait

    Supports for creating 1000-person groups and multi-person conference call. All messages, pictures and videos are protected by end-to-end encryption. Industry-standard 256-bit AES end-to-end encryption is adopted across the platforms. To prevent any possible man-in-the-middle attack and to ensure data security, all communication goes through Transport Layer Security (TLS). With administrative control, organizational structure can be built in the software, and employees can be authorized to different layers of data. Enjoy end-to-end encrypted conference calls with auto-spotlight, for up to 20 users. The auto-spotlight feature amplifies the main speaker's voice, along with the noise cancellation function. 1 to 1 chat and group chat up to 1000 users. Forward, recall and delete message options available. 1 to 1 audio call and group audio call up to 20 users. The mute function is available to silence the background noise.
  • 28
    Aegis Authenticator

    Aegis Authenticator

    Beem Development

    Aegis Authenticator is a free, secure, open source Android app for managing two-factor authentication tokens, helping users add an extra layer of security to their online accounts by generating time-based or HMAC-based one-time codes (HOTP/TOTP) that work with thousands of services that support industry-standard 2FA, making it a privacy-respecting alternative to apps like Google Authenticator or Authy. Tokens are stored in a locally encrypted vault that can be unlocked with a strong password and optionally with device biometrics, and the app includes features such as encrypted backups, QR-code scanning, manual entry, and import/export from other authenticator apps so users can migrate their existing 2FA credentials easily and securely. Aegis provides extensive organization tools including custom icons, grouping, alphabetical and custom sorting, and search to help manage many accounts effectively, and its design emphasizes security and privacy.
  • 29
    LEADTOOLS Imaging SDK
    LEADTOOLS Imaging SDK Technology includes the tools developers need to add powerful imaging technology to their applications. Based on more than 32 years of imaging development, LEADTOOLS Imaging features include more than 150 image formats, image compression, more than 200 image processing functions, image viewers, common dialogs, more than 200 display effects, TWAIN, and WIA scanning, screen capture, and printing. With LEADTOOLS, developers can create applications to load, save, and convert many industry-standard and proprietary formats. LEAD Technologies is committed to maintaining and expanding the most comprehensive support of file formats on the market, and currently supports more than 150 raster, vector, and document file formats and sub-formats.
  • 30
    FinalCode

    FinalCode

    Digital Arts

    It was realized with original technology and advancedness. It consists of "FinalCode Client" that encrypts and browses files, and "FinalCode Server" that manages file authority information. , which does not require server construction and operation costs, or "FinalCode Ver.6 VA" (on-premise version: VA) , which operates on our own server, Automatically encrypts files when they are created, saved, or downloaded. Even if it is encrypted, there is no need for operation training because it is as easy to use as before. In addition, users can use it regardless of security literacy because encryption is transparent to users. We provide an executable API that allows you to call the encryption/decryption functions of "FinalCode" from internal business systems such as document management systems and workflow systems.
  • 31
    AWS Thinkbox Sequoia
    AWS Thinkbox Sequoia is a standalone application for point cloud processing and meshing, compatible with Windows, Linux, and macOS operating systems. It accepts point cloud and mesh data in various industry-standard formats, converting point cloud data into a compact and fast-to-access intermediate cache format. Sequoia offers intelligent workflows to retain high-precision data efficiently, displaying all or a fraction of the point cloud data using adaptive view-dependent methods. Users can transform, cull, and modify point cloud data, generate meshes from point clouds, and optimize the produced meshes. The software supports projecting images onto points and meshes, generating mesh vertex colors, Ptex, or UV-based textures from point cloud colors and image projections. It exports resulting meshes to supported industry-standard mesh file formats and integrates with Thinkbox Deadline to perform point cloud data conversion, meshing, and export on network nodes.
  • 32
    PowerArchiver

    PowerArchiver

    PowerArchiver

    Compress, encrypt, exchange, and backup your data. Support for over 60 formats: ZIP, ZIPX, 7z, RAR, TAR, and more. Strongest possible compression with PA format. FIPS 140-2 validated 256-bit AES encryption! PowerArchiver combines many useful tools in a single package! Fastest and most feature-packed file management today! Advanced Codec Pack (.PA) is the most advanced format on the market. Encrypt, Decrypt, Sign and Verify in various AES and OpenPGP formats. FIPS 140-2 validated! Best format with strongest compression, data deduplication, and very secure encryption. Secure FTP client with all the features, including FIPS 140-2 validation! Automatically compress and encrypt files in Microsoft Office XP-2016. Access 6 different cloud services without the need to install their software! Full Enterprise Backup suite with shadow copy support, logs, network backup, and more! Mount ISO images in a virtual drive without having to burn them!
    Starting Price: $22.25 one-time payment
  • 33
    TCPDF

    TCPDF

    TCPDF

    TCPDF is now one of the world's most active open-source projects, used daily by millions of users and included in thousands of CMS and web applications. No external libraries are required for the basic functions, all standard page formats, custom page formats, custom margins, and units of measure. UTF-8 Unicode and right-to-left languages. TrueType Unicode, OpenType Unicode, TrueType, OpenType, Type1 and CID-0 fonts, and font subsetting. Methods to publish some XHTML + CSS code, Javascript, and forms. Images, graphics (geometric figures), and transformation methods. Supports JPEG, PNG, and SVG images natively, all images supported by GD (GD, GD2, GD2PART, GIF, JPEG, PNG, BMP, XBM, XPM), and all images supported via ImagMagick. Automatic page header and footer management. Document encryption up to 256-bit and digital signature certifications, transactions to UNDO commands, and PDF annotations, including links, text and file attachments.
  • 34
    PDFBox

    PDFBox

    Apache Software Foundation

    The Apache PDFBox® library is an open-source Java tool for working with PDF documents. This project allows the creation of new PDF documents, manipulation of existing documents and the ability to extract content from documents. Apache PDFBox also includes several command-line utilities. Apache PDFBox is published under the Apache License v2.0. Extract Unicode text from PDF files. Split a single PDF into many files or merge multiple PDF files. Extract data from PDF forms or fill a PDF form. Validate PDF files against the PDF/A-1b standard. Print a PDF file using the standard Java printing API. Create a PDF from scratch, with embedded fonts and images. Save PDFs as image files, such as PNG or JPEG and digitally sign PDF files. See also the export control information related to the encryption features included in Apache PDFBox.
  • 35
    Azure Files

    Azure Files

    Microsoft

    Take advantage of fully managed file shares in the cloud that are accessible via the industry-standard Server Message Block (SMB) protocol. Mount file shares concurrently in the cloud or on-premises on Windows, Linux, and macOS. Plus, cache Azure file shares on Windows Servers with Azure File Sync for local access performance. Use premium shares for performance-sensitive, IO intensive workloads and standard shares for reliable, general purpose file storage.
  • 36
    Fast Scanner

    Fast Scanner

    Fast Scanner

    Fast Scanner scans any type of documents, ranging from a receipt to multiple pages book. All scanned documents are exported as industry-standard PDF file. You can add new pages or delete existed pages within the PDF file. Fast Scanner support a lot of image editing options so you can make the scanned images as easy to read as possible. Fast Scanner scans any type of documents, ranging from a receipt to multiple pages book. All scanned documents are exported as industry-standard PDF file. You can add new pages or delete existed pages within the PDF file. Fast Scanner support a lot of image editing options so you can make the scanned images as easy to read as possible.
  • 37
    Hush App

    Hush App

    Syneidis

    Encryption is easy. Secure file transfers for Android, iOS and Web. Send encrypted files to anyone, even if they don’t have the app. Set up a business account, invite users to the team and manage permissions. HushApp is extremely easy to use whether you send or receive files. We don't have any information about you, your keys, files you store or send. With HushApp you can send encrypted files even to users who don't have the app. We use military-grade AES-256 and RSA-2048 encryption standards to protect your files. We are based in European Union and so are our servers. Do you want to secure business communication or preoccupied about GDPR? Our app helps you to keep all the work-related documents private and safe. HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.
  • 38
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 39
    Space

    Space

    Space

    What you store on Space is not siloed in our platform. You own and control your space, and can access it via other interfaces if you wish. All files, transfers, and interactions in Space are end-to-end-encrypted, and only users have control of the decryption keys. Anyone can review our code and verify our privacy and security claims, and developers can openly build on top of our Open Web stack. Store files online in a Space only you can control and access. The keys to your files and account are in your hands only, not ours, and all files are automatically backed to Filecoin, as a decentralized layer. All accounts in Space are tied to an Ethereum key-pair only you own and have access to. You can choose to log in with Twitter, Gmail, or email protected by the Torus network, or using high-privacy alternatives like MetaMask and other crypto wallets. Share with convenient options (email, social handles, ENS, etc.) or privacy-first ones (crypto addresses, links).
    Starting Price: $11 per month
  • 40
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 41
    Keywhiz

    Keywhiz

    Keywhiz

    Keywhiz is a system for managing and distributing secrets. It can fit well with a service oriented architecture (SOA). Here is an overview in presentation format. Common practices include putting secrets in config files next to code or copying files to servers out-of-band. The former is likely to be leaked and the latter difficult to track. Keywhiz makes managing secrets easier and more secure. Keywhiz servers in a cluster centrally store secrets encrypted in a database. Clients use mutually authenticated TLS (mTLS) to retrieve secrets they have access to. Authenticated users administer Keywhiz via CLI. To enable workflows, Keywhiz has automation APIs over mTLS. Every organization has services or systems that require secrets. Secrets like TLS certificates/keys, GPG keys, API tokens, database credentials. Keywhiz is reliable and used in production, however occasional changes may break API backward compatibility.
  • 42
     dbForge SQL Decryptor
    dbForge SQL Decryptor is a highly functional free tool designed for decrypting database objects that were created with the WITH ENCRYPTION option. Key Features: - Connecting to multiple servers, both local and remote - Decryption of all types of objects, including stored procedures, functions, triggers, and views - Batch decryption wizard for bulk operations - Saving decrypted objects to a single T-SQL file or separate T-SQL files for each object - Decrypting objects directly on the server for further work in SSMS - Restoration of original T-SQL descriptions even if the original source file is unavailable - Support for all national characters - Search for encrypted objects and filtering them by object types - Syntax highlighting for both code and comments - No DAC (Dedicated Administrator Connection) mode required - No need for manual T-SQL coding dbForge SQL Decryptor, with its light and easy-to-operate user interface, is an essential tool for
  • 43
    3D-Tool

    3D-Tool

    3D-Tool

    Open and see any 3D part or assembly clearly—without expensive CAD software. 3D‑Tool lets you open, view, measure, and mark-up 3D CAD models in a simple, affordable way. Designers, engineers, and project managers can review parts from many CAD systems without needing the original software. The Premium and Advanced versions support 20+ file formats and let you share annotated models with anyone using the Free Viewer app. The Free Viewer opens native 3D‑Tool files (Those exported by a paid version of 3D-Tool) and STL files, making collaboration easy. The Premium version adds a powerful converter that turns native CAD files into STEP or CAT formats for use in NC, CMM, and other systems that can’t open the originals. Cross Sections • Exploded Views • 3D/2D Measure • Model Compare • Draft & Wall Analysis • Collision Check • Custom Views • Annotations • Publish EXE/DDD/3D‑PDF • STL/OBJ/3DS/PLY Export
    Starting Price: $245 per license
  • 44
    Javelin PDF Reader

    Javelin PDF Reader

    Drumlin Security

    Javelin PDF readers provide all the core functionality needed for viewing standard PDF files and PDF files encrypted using our free Drumlin Publisher software (.drmz and .drmx files). These readers support internal and external hyperlinks, contents/navigation trees, a range of page display formats, plus document text searching, annotation, and markup. Encrypted files are protected against content copying and onwards distribution. They may also have restrictions applied such as whether printing is permitted and whether they expire at some point and can no longer be viewed. The properties and/or info facility in the Javelin readers provides details of these Digital Rights Management (DRM) settings. Visually impaired users should select the Mac OSX/Catalina Javelin3 software as this supports text-to-speech conversion. You can use Javelin on a PC or Mac connected to a large corporate network with a restrictive firewall.
  • 45
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 46
    File Viewer Plus

    File Viewer Plus

    File Viewer Plus

    File Viewer Plus 4 opens over 400 file formats. View dozens of common file types, such as Office documents, PDFs, and image files, all with one program. Play hundreds of audio and video file formats with the built-in media player. Decompress archives with the file decompression tool. You can also open less common file formats with File Viewer Plus. View Microsoft Project and Visio documents. Open source code files with syntax highlighting. Open email attachments and downloads. If you have unknown files on your PC, try File Viewer Plus. Not only can you open hundreds of file formats with File Viewer Plus, you can also edit, save, and convert files. Edit a Word document and save it as a PDF. Crop a raw image from a digital camera and export it as a JPEG. Convert thousands of files at once with the built-in batch converter.
    Starting Price: $49.99 one-time payment
  • 47
    MicroDicom

    MicroDicom

    MicroDicom

    MicroDicom DICOM viewer is primarily designed to process and visualize medical images in DICOM format, a standard format for medical imaging. It is equipped with the most common tools for manipulation of DICOM images and supports a wide variety of image formats beyond DICOM, such as JPEG, BMP, PNG, and TIFF. It allows for easy opening and saving of medical images, measurement of distance and angle, and adjustment of brightness and contrast. MicroDicom includes support for annotations, export of images to common picture formats, and the ability to anonymize DICOM files. The user interface is intuitive and easy to navigate, making it accessible for both professionals and students. It also offers support for burning DICOM files to CD/DVD and includes a built-in CD/DVD viewer. MicroDicom DICOM viewer can be used to view images from PACS servers and local storage. It includes support for DICOMDIR files and multi-frame images and is capable of printing DICOM images.
    Starting Price: $99 per year
  • 48
    Razuna DAM
    Razuna, a hosted Digital Asset Management system, is the most popular web app for collaborating, managing, sharing and publishing your organizations images, videos, audio files and documents online. The Razuna DAM lets you store your digital assets on your server or gives you the option to use a cloud storage provider (Amazon S3 or Eucalyptus) or deploy on your virtualization platform. Read on about Razuna DAM in the Cloud. Manage and publish any digital asset with your own Digital Asset Management system. Razuna supports any video, image, audio or document format. Additionally, a smart conversion engine helps you to deliver any asset in the right format. The Razuna DAM will store your digital assets securely. The system is build with security in mind. You can safely store on your network, use SSL encryption, setup user permissions and/or deploy your digital asset management system in the cloud.
    Starting Price: $24.00/month
  • 49
    ScreenSharing

    ScreenSharing

    ScreenSharing

    ScreenSharing offers a lightweight and browser-based screen sharing solution that enables instant sharing without the need for downloads. Key Features: Easy Initiation: With a simple click on the "SHARE MY SCREEN" button, users can start a new sharing session. They can then select the specific screen or application window they wish to share and copy the generated link to share with their audience. High-Quality Streaming: It provides crystal clear screen sharing with adaptive quality that adjusts according to network conditions, ensuring a smooth viewing experience. Security Measures: The service offers enterprise-level security. All screen sharing sessions are encrypted using industry-standard protocols with end-to-end encryption. Each session uses a unique, encrypted room ID that expires after use, and users have full control over access, allowing them to terminate a session instantly if needed. Cross-Platform Compatibility: It works on all major browsers & OSes.
  • 50
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.