Best Software for 2025 is now live!

Top Free Encryption Key Management Software

Check out our list of free Encryption Key Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Encryption Key Management Software to ensure you get the right product.

View Free Encryption Key Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
15 Encryption Key Management Products Available
(1,012)4.4 out of 5
Optimized for quick response
1st Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

    Users
    • Project Manager
    • Assistant Manager
    Industries
    • Marketing and Advertising
    • Construction
    Market Segment
    • 43% Small-Business
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Egnyte features and usability ratings that predict user satisfaction
    9.1
    Regional Support
    Average: 8.6
    9.1
    Scalability
    Average: 8.7
    8.9
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    I have been using this product for about 11+ years paying over $ 500 a year just to access my files (way less than 1 TB) when I want, for... Read review
    Justin E.
    JE
    Egnyte makes file sharing easy, especially on mixed networks (PC and Mac). The software mounts the drive, making it very easy for users to quickly... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Egnyte
    Company Website
    Year Founded
    2008
    HQ Location
    Mountain View, CA
    Twitter
    @Egnyte
    16,469 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,168 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

Users
  • Project Manager
  • Assistant Manager
Industries
  • Marketing and Advertising
  • Construction
Market Segment
  • 43% Small-Business
  • 40% Mid-Market
Egnyte features and usability ratings that predict user satisfaction
9.1
Regional Support
Average: 8.6
9.1
Scalability
Average: 8.7
8.9
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.8
Verified User in Information Technology and Services
UI
I have been using this product for about 11+ years paying over $ 500 a year just to access my files (way less than 1 TB) when I want, for... Read review
Justin E.
JE
Egnyte makes file sharing easy, especially on mixed networks (PC and Mac). The software mounts the drive, making it very easy for users to quickly... Read review
Seller Details
Seller
Egnyte
Company Website
Year Founded
2008
HQ Location
Mountain View, CA
Twitter
@Egnyte
16,469 Twitter followers
LinkedIn® Page
www.linkedin.com
1,168 employees on LinkedIn®
(67)4.6 out of 5
Optimized for quick response
10th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

    Users
    No information available
    Industries
    • Computer Software
    • Marketing and Advertising
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Platform features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    9.3
    Scalability
    Average: 8.7
    8.5
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joseph B.
    JB
    Their pricing system is great. While I'm now on the business plan, I was initially on the free "starter" plan which was a great way of making sure... Read review
    US
    Seamless connection to Stack. It really helps in reducing the communication time between multiple teams. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    244 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

Users
No information available
Industries
  • Computer Software
  • Marketing and Advertising
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
Akeyless Platform features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
9.3
Scalability
Average: 8.7
8.5
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.8
Joseph B.
JB
Their pricing system is great. While I'm now on the business plan, I was initially on the free "starter" plan which was a great way of making sure... Read review
US
Seamless connection to Stack. It really helps in reducing the communication time between multiple teams. Read review
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
244 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(327)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

    Users
    • IT Manager
    Industries
    • Hospital & Health Care
    • Health, Wellness and Fitness
    Market Segment
    • 46% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Email Encryption features and usability ratings that predict user satisfaction
    7.8
    Regional Support
    Average: 8.6
    7.8
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Susan C.
    SC
    This software is so easy to install and use. It's absolutely perfect for Gmail. One click of a button secures any email message, and the recipient... Read review
    Verified User in Higher Education
    EH
    ease of use for end user (sender and recipient), cost. It was easy to integrate with our existing environment, quick to be adopted by end users,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    183 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

Users
  • IT Manager
Industries
  • Hospital & Health Care
  • Health, Wellness and Fitness
Market Segment
  • 46% Mid-Market
  • 39% Small-Business
Virtru Email Encryption features and usability ratings that predict user satisfaction
7.8
Regional Support
Average: 8.6
7.8
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.8
Susan C.
SC
This software is so easy to install and use. It's absolutely perfect for Gmail. One click of a button secures any email message, and the recipient... Read review
Verified User in Higher Education
EH
ease of use for end user (sender and recipient), cost. It was easy to integrate with our existing environment, quick to be adopted by end users,... Read review
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,803 Twitter followers
LinkedIn® Page
www.linkedin.com
183 employees on LinkedIn®
(45)4.3 out of 5
8th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    7.6
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Fernando B.
    FB
    Vault is super flexible, and helps you implement from simple secrets management to dynamic credentials and a series of other operations with data... Read review
    Verified User in Automotive
    AA
    Secret as a Service (Dynamic secrets) and flexibility. Good integration with multiple authentication provider. Good varities on Dynamic secrets... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    97,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,465 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
7.6
Ease of Use
Average: 8.8
Fernando B.
FB
Vault is super flexible, and helps you implement from simple secrets management to dynamic credentials and a series of other operations with data... Read review
Verified User in Automotive
AA
Secret as a Service (Dynamic secrets) and flexibility. Good integration with multiple authentication provider. Good varities on Dynamic secrets... Read review
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
97,547 Twitter followers
LinkedIn® Page
www.linkedin.com
2,465 employees on LinkedIn®
Ownership
NASDAQ: HCP
(55)4.8 out of 5
2nd Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    Market Segment
    • 84% Small-Business
    • 16% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    8.1
    Regional Support
    Average: 8.6
    9.4
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    9.5
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Harrison H.
    HH
    Simple UI, intuitive, environments, sync with git, what's not to like? Read review
    Verified User in Information Technology and Services
    AI
    Doppler has been the most profitable purchase of the last 2 years in the company where I work. We've been using it for 2 years now, and it enables... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
Market Segment
  • 84% Small-Business
  • 16% Mid-Market
Doppler secrets management platform features and usability ratings that predict user satisfaction
8.1
Regional Support
Average: 8.6
9.4
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
9.5
Ease of Use
Average: 8.8
Harrison H.
HH
Simple UI, intuitive, environments, sync with git, what's not to like? Read review
Verified User in Information Technology and Services
AI
Doppler has been the most profitable purchase of the last 2 years in the company where I work. We've been using it for 2 years now, and it enables... Read review
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,243 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
(56)4.5 out of 5
7th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 80% Enterprise
    • 14% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command features and usability ratings that predict user satisfaction
    8.6
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    8.7
    API/Integrations
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    AI
    The company is great to work with, their product is changing based on customer feedback. Tech Support is also wonderful Read review
    Verified User in Information Technology and Services
    AI
    Flexible, user friendly Ui and stable. Each version release continues to improve on the previous version. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Company Website
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    440 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 80% Enterprise
  • 14% Mid-Market
Keyfactor Command features and usability ratings that predict user satisfaction
8.6
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
8.7
API/Integrations
Average: 8.5
8.2
Ease of Use
Average: 8.8
Verified User in Insurance
AI
The company is great to work with, their product is changing based on customer feedback. Tech Support is also wonderful Read review
Verified User in Information Technology and Services
AI
Flexible, user friendly Ui and stable. Each version release continues to improve on the previous version. Read review
Seller Details
Seller
Keyfactor
Company Website
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,755 Twitter followers
LinkedIn® Page
www.linkedin.com
440 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Data Protection on Demand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NA
    The authentication integration with the mobile device (Mobilepass +) is very good and connects to seamlessly. The web portal offers a lot of... Read review
    Nishant A.
    NA
    It is not just data protection, it is data protection on demand! The Hardware Security Module has proven to be a great innovation for us to set up... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,830 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales Data Protection on Demand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
NA
The authentication integration with the mobile device (Mobilepass +) is very good and connects to seamlessly. The web portal offers a lot of... Read review
Nishant A.
NA
It is not just data protection, it is data protection on demand! The Hardware Security Module has proven to be a great innovation for us to set up... Read review
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,830 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    3.3
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Hospitality
    AH
    Very easy to get started, good help through links, good overview, easy to navigate. Impressed by the support! Supports profiles for Samsung... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    418 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

Users
No information available
Industries
No information available
Market Segment
  • 33% Small-Business
  • 33% Enterprise
ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
3.3
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Verified User in Hospitality
AH
Very easy to get started, good help through links, good overview, easy to navigate. Impressed by the support! Supports profiles for Samsung... Read review
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,655 Twitter followers
LinkedIn® Page
www.linkedin.com
418 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ubiq Encryption Platform features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Management Consulting
    EM
    It works with unstructured and structured data, supports format preservation, and full and partial data masking. It is 100% cloud-based with fully... Read review
    Verified User in Computer & Network Security
    UC
    It has SDKs and REST APIs. Very easy to interface programmatically. Supports auto-detection of encrypted vs plain-text data via SDK calls. Very... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Ubiq Encryption Platform features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Verified User in Management Consulting
EM
It works with unstructured and structured data, supports format preservation, and full and partial data masking. It is 100% cloud-based with fully... Read review
Verified User in Computer & Network Security
UC
It has SDKs and REST APIs. Very easy to interface programmatically. Supports auto-detection of encrypted vs plain-text data via SDK calls. Very... Read review
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EncryptRIGHT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AS
    I like to protect information data and application code within the local server and public cloud, password protection, and access. Different... Read review
    RS
    Safety in the hands and activity control of all applications managed by the software, customization of structures and completion. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Eugene, OR
    Twitter
    @Prime_Factors
    213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
EncryptRIGHT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.8
AS
I like to protect information data and application code within the local server and public cloud, password protection, and access. Different... Read review
RS
Safety in the hands and activity control of all applications managed by the software, customization of structures and completion. Read review
Seller Details
HQ Location
Eugene, OR
Twitter
@Prime_Factors
213 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command for IoT features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Arup Kumar P.
    AP
    The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    440 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Keyfactor Command for IoT features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.2
Ease of Use
Average: 8.8
Arup Kumar P.
AP
The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly... Read review
Seller Details
Seller
Keyfactor
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,755 Twitter followers
LinkedIn® Page
www.linkedin.com
440 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortanix features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.4
    Ease of Use
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RR
    I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and... Read review
    HR
    By decoupling encryption keys from equipment, it awards me adaptability in sending safety efforts across various cloud conditions. This has been... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortanix
    Year Founded
    2016
    HQ Location
    Santa Clara CA
    Twitter
    @fortanix
    1,029 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Fortanix features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.4
Ease of Use
Average: 8.8
RR
I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and... Read review
HR
By decoupling encryption keys from equipment, it awards me adaptability in sending safety efforts across various cloud conditions. This has been... Read review
Seller Details
Seller
Fortanix
Year Founded
2016
HQ Location
Santa Clara CA
Twitter
@fortanix
1,029 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sepior features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sepior
Product Description
How are these determined?Information
This description is provided by the seller.

Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sepior features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sepior
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solu

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Unbound CORE for Information Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solu

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Unbound CORE for Information Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details