Best Software for 2025 is now live!
|| products.size

Best Encryption Software for Medium-Sized Businesses

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Encryption category are similar in many regards and help companies of all sizes solve their business problems. However, medium-sized business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Medium-Sized Business Encryption to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Medium-Sized Business Encryption category.

In addition to qualifying for inclusion in the Encryption Software category, to qualify for inclusion in the Medium-Sized Business Encryption Software category, a product must have at least 10 reviews left by a reviewer from a medium-sized business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
15 Listings in Encryption Available
(1,051)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Encryption software
Save to My Lists
100% off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

    Users
    • Owner
    • IT Manager
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Keeper Password Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    183
    Security
    123
    Password Management
    97
    Secure Sharing
    94
    Sharing Ease
    81
    Cons
    Password Management
    71
    Autofill Issues
    46
    Login Issues
    39
    Browser Extension Issues
    31
    Missing Features
    31
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Password Manager features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Data Encryption
    Average: 9.2
    9.1
    Document Encryption
    Average: 8.8
    8.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    19,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    437 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

Users
  • Owner
  • IT Manager
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Keeper Password Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
183
Security
123
Password Management
97
Secure Sharing
94
Sharing Ease
81
Cons
Password Management
71
Autofill Issues
46
Login Issues
39
Browser Extension Issues
31
Missing Features
31
Keeper Password Manager features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Data Encryption
Average: 9.2
9.1
Document Encryption
Average: 8.8
8.6
Policy Enforcement
Average: 8.6
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
19,015 Twitter followers
LinkedIn® Page
www.linkedin.com
437 employees on LinkedIn®
(457)4.4 out of 5
Optimized for quick response
8th Easiest To Use in Encryption software
Save to My Lists
Entry Level Price:30 day free trial
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Progress MOVEit is Managed File Transfer Software that enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It prov

    Users
    • Software Engineer
    • IT Director
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Mid-Market
    • 37% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • MOVEit is a file transfer tool that provides an encrypted platform for sending and receiving files, integrating with various software systems, and reducing human error.
    • Reviewers frequently mention the ease of use, the ability to send files to people without a MOVEit account, the tool's adaptability, and its advanced task programmability and scripting functionality.
    • Reviewers experienced issues with upgrades, slow data transfer for large files, limited customization options, and a security incident in 2023 that negatively impacted many organizations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Progress MOVEit Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    38
    File Transfer
    31
    Features
    20
    Automation
    15
    Secure Transfer
    14
    Cons
    Complexity
    17
    Security Issues
    8
    File Management
    7
    Slow Performance
    7
    Complex Setup
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Progress MOVEit features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Data Encryption
    Average: 9.2
    9.1
    Document Encryption
    Average: 8.8
    8.8
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1981
    HQ Location
    Burlington, MA.
    Twitter
    @ProgressSW
    50,188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,615 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Progress MOVEit is Managed File Transfer Software that enables the consolidation of all file transfer activities to one system to ensure better management control over core business processes. It prov

Users
  • Software Engineer
  • IT Director
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Mid-Market
  • 37% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • MOVEit is a file transfer tool that provides an encrypted platform for sending and receiving files, integrating with various software systems, and reducing human error.
  • Reviewers frequently mention the ease of use, the ability to send files to people without a MOVEit account, the tool's adaptability, and its advanced task programmability and scripting functionality.
  • Reviewers experienced issues with upgrades, slow data transfer for large files, limited customization options, and a security incident in 2023 that negatively impacted many organizations.
Progress MOVEit Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
38
File Transfer
31
Features
20
Automation
15
Secure Transfer
14
Cons
Complexity
17
Security Issues
8
File Management
7
Slow Performance
7
Complex Setup
6
Progress MOVEit features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.3
Data Encryption
Average: 9.2
9.1
Document Encryption
Average: 8.8
8.8
Policy Enforcement
Average: 8.6
Seller Details
Company Website
Year Founded
1981
HQ Location
Burlington, MA.
Twitter
@ProgressSW
50,188 Twitter followers
LinkedIn® Page
www.linkedin.com
3,615 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(327)4.4 out of 5
Optimized for quick response
2nd Easiest To Use in Encryption software
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

    Users
    • IT Manager
    Industries
    • Hospital & Health Care
    • Health, Wellness and Fitness
    Market Segment
    • 46% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virtru Email Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Security
    45
    Encryption
    32
    Protection
    24
    Secure Communication
    24
    Cons
    Email Issues
    30
    Email Encryption Issues
    21
    Access Issues
    14
    Access Limitations
    13
    Encryption Issues
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Email Encryption features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Data Encryption
    Average: 9.2
    9.3
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    183 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

Users
  • IT Manager
Industries
  • Hospital & Health Care
  • Health, Wellness and Fitness
Market Segment
  • 46% Mid-Market
  • 39% Small-Business
Virtru Email Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Security
45
Encryption
32
Protection
24
Secure Communication
24
Cons
Email Issues
30
Email Encryption Issues
21
Access Issues
14
Access Limitations
13
Encryption Issues
11
Virtru Email Encryption features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.3
Data Encryption
Average: 9.2
9.3
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,803 Twitter followers
LinkedIn® Page
www.linkedin.com
183 employees on LinkedIn®
(444)4.4 out of 5
1st Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Making private communication simple.

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 69% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Signal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    49
    Ease of Use
    30
    User Interface
    15
    Features
    14
    Communication
    12
    Cons
    Missing Features
    14
    File Sharing Issues
    7
    Connectivity Issues
    4
    Learning Curve
    4
    Not Intuitive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Signal features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Signal
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @signalapp
    588,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Making private communication simple.

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 69% Small-Business
  • 22% Mid-Market
Signal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
49
Ease of Use
30
User Interface
15
Features
14
Communication
12
Cons
Missing Features
14
File Sharing Issues
7
Connectivity Issues
4
Learning Curve
4
Not Intuitive
4
Signal features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Signal
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@signalapp
588,702 Twitter followers
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
(35)4.3 out of 5
13th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileVault is a disk encryption program in Mac OS X 10.3 and later.

    Users
    No information available
    Industries
    • Marketing and Advertising
    Market Segment
    • 37% Small-Business
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileVault features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    9.4
    Document Encryption
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Apple
    Year Founded
    1976
    HQ Location
    Cupertino, CA
    Twitter
    @Apple
    9,774,678 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169,401 employees on LinkedIn®
    Ownership
    NASDAQ:AAPL
Product Description
How are these determined?Information
This description is provided by the seller.

FileVault is a disk encryption program in Mac OS X 10.3 and later.

Users
No information available
Industries
  • Marketing and Advertising
Market Segment
  • 37% Small-Business
  • 34% Enterprise
FileVault features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
9.4
Document Encryption
Average: 8.8
0.0
No information available
Seller Details
Seller
Apple
Year Founded
1976
HQ Location
Cupertino, CA
Twitter
@Apple
9,774,678 Twitter followers
LinkedIn® Page
www.linkedin.com
169,401 employees on LinkedIn®
Ownership
NASDAQ:AAPL
Entry Level Price:$77 node/year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kaspersky Endpoint Security for Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    5
    Threat Protection
    5
    Cybersecurity Protection
    4
    Ease of Use
    4
    Performance
    3
    Cons
    Cybersecurity Risks
    1
    Difficult Navigation
    1
    Excessive Blocking
    1
    High Resource Usage
    1
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Endpoint Security for Business features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.9
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,325 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,057 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 30% Small-Business
Kaspersky Endpoint Security for Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
5
Threat Protection
5
Cybersecurity Protection
4
Ease of Use
4
Performance
3
Cons
Cybersecurity Risks
1
Difficult Navigation
1
Excessive Blocking
1
High Resource Usage
1
Lack of Information
1
Kaspersky Endpoint Security for Business features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.9
Policy Enforcement
Average: 8.6
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,325 Twitter followers
LinkedIn® Page
www.linkedin.com
4,057 employees on LinkedIn®
Phone
1-866-328-5700
(34)4.2 out of 5
12th Easiest To Use in Encryption software
View top Consulting Services for Trend Micro Endpoint Encryption
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full di

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Endpoint Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Configuration Flexibility
    1
    Customer Support
    1
    Deployment Ease
    1
    Ease of Use
    1
    Efficiency
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Endpoint Encryption features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.8
    Data Encryption
    Average: 9.2
    7.3
    Document Encryption
    Average: 8.8
    6.9
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full di

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 29% Small-Business
Trend Micro Endpoint Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Configuration Flexibility
1
Customer Support
1
Deployment Ease
1
Ease of Use
1
Efficiency
1
Cons
Slow Performance
1
Trend Micro Endpoint Encryption features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
7.8
Data Encryption
Average: 9.2
7.3
Document Encryption
Average: 8.8
6.9
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(233)4.5 out of 5
9th Easiest To Use in Encryption software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tresorit is an end-to-end encrypted, zero-knowledge content collaboration platform that enables security-conscious companies to manage, sync, sign, and share their files safely. Unlike other public cl

    Users
    • CEO
    • Manager
    Industries
    • Information Technology and Services
    • Non-Profit Organization Management
    Market Segment
    • 86% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tresorit Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    6
    Reliability
    4
    Data Protection
    3
    Encryption
    3
    Cons
    Expensive
    4
    Access Limitations
    1
    Complex Setup
    1
    Connectivity Issues
    1
    Document
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tresorit features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    8.8
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tresorit
    Year Founded
    2011
    HQ Location
    Zurich, Zurich
    Twitter
    @Tresorit
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    134 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tresorit is an end-to-end encrypted, zero-knowledge content collaboration platform that enables security-conscious companies to manage, sync, sign, and share their files safely. Unlike other public cl

Users
  • CEO
  • Manager
Industries
  • Information Technology and Services
  • Non-Profit Organization Management
Market Segment
  • 86% Small-Business
  • 12% Mid-Market
Tresorit Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
6
Reliability
4
Data Protection
3
Encryption
3
Cons
Expensive
4
Access Limitations
1
Complex Setup
1
Connectivity Issues
1
Document
1
Tresorit features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
8.8
Policy Enforcement
Average: 8.6
Seller Details
Seller
Tresorit
Year Founded
2011
HQ Location
Zurich, Zurich
Twitter
@Tresorit
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
134 employees on LinkedIn®
(261)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Encryption software
View top Consulting Services for WatchGuard Network Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on b

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WatchGuard Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Cybersecurity
    3
    User Interface
    3
    Customer Support
    2
    Features
    2
    Cons
    Expensive
    3
    Poor Customer Support
    2
    Limited Customization
    1
    Limited Features
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Network Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Data Encryption
    Average: 9.2
    8.9
    Document Encryption
    Average: 8.8
    9.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,933 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,082 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on b

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Mid-Market
  • 43% Small-Business
WatchGuard Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Cybersecurity
3
User Interface
3
Customer Support
2
Features
2
Cons
Expensive
3
Poor Customer Support
2
Limited Customization
1
Limited Features
1
Poor Interface Design
1
WatchGuard Network Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.1
Data Encryption
Average: 9.2
8.9
Document Encryption
Average: 8.8
9.0
Policy Enforcement
Average: 8.6
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,933 Twitter followers
LinkedIn® Page
www.linkedin.com
1,082 employees on LinkedIn®
(47)4.7 out of 5
5th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

    Users
    • Software Engineer
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 51% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VGS Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    2
    Compliance Management
    2
    Ease of Use
    2
    Audit Management
    1
    Customer Support
    1
    Cons
    Audit Issues
    1
    Evidence Collection
    1
    Expensive
    1
    Limited Functionality
    1
    Manual Intervention Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VGS Platform features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.8
    Data Encryption
    Average: 9.2
    8.9
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Francisco, California
    Twitter
    @getvgs
    1,369 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

Users
  • Software Engineer
Industries
  • Financial Services
  • Banking
Market Segment
  • 51% Mid-Market
  • 45% Small-Business
VGS Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
2
Compliance Management
2
Ease of Use
2
Audit Management
1
Customer Support
1
Cons
Audit Issues
1
Evidence Collection
1
Expensive
1
Limited Functionality
1
Manual Intervention Required
1
VGS Platform features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.8
Data Encryption
Average: 9.2
8.9
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2015
HQ Location
San Francisco, California
Twitter
@getvgs
1,369 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HashiCorp Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Easy Integrations
    4
    Integrations
    4
    Security
    4
    Useful
    2
    Cons
    Learning Curve
    3
    Process Complexity
    2
    Steep Learning Curve
    2
    Complexity Issues
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.2
    0.0
    Document Encryption
    Average: 8.8
    6.7
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    97,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,465 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Easy Integrations
4
Integrations
4
Security
4
Useful
2
Cons
Learning Curve
3
Process Complexity
2
Steep Learning Curve
2
Complexity Issues
1
Complex Setup
1
HashiCorp Vault features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.2
0.0
Document Encryption
Average: 8.8
6.7
Policy Enforcement
Average: 8.6
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
97,547 Twitter followers
LinkedIn® Page
www.linkedin.com
2,465 employees on LinkedIn®
Ownership
NASDAQ: HCP
(30)3.9 out of 5
14th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sophos Intercept X Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cybersecurity
    1
    Easy Installation
    1
    Easy Integrations
    1
    Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Intercept X features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,989 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,763 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
Sophos Intercept X Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cybersecurity
1
Easy Installation
1
Easy Integrations
1
Efficiency
1
Cons
This product has not yet received any negative sentiments.
Sophos Intercept X features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,989 Twitter followers
LinkedIn® Page
www.linkedin.com
4,763 employees on LinkedIn®
Ownership
LSE:SOPH
By Tor
(42)4.4 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tor features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Data Encryption
    Average: 9.2
    7.8
    Document Encryption
    Average: 8.8
    8.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tor
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @torproject
    457,243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 26% Mid-Market
Tor features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.6
Data Encryption
Average: 9.2
7.8
Document Encryption
Average: 8.8
8.6
Policy Enforcement
Average: 8.6
Seller Details
Seller
Tor
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@torproject
457,243 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
(51)4.5 out of 5
7th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 43% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeraCrypt features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.5
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VeraCrypt
    HQ Location
    Paris
    Twitter
    @VeraCrypt_IDRIX
    4,867 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 43% Enterprise
  • 35% Mid-Market
VeraCrypt features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.5
Policy Enforcement
Average: 8.6
Seller Details
Seller
VeraCrypt
HQ Location
Paris
Twitter
@VeraCrypt_IDRIX
4,867 Twitter followers
LinkedIn® Page
www.linkedin.com
(19)4.4 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Crypho Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Crypho features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Crypho
    Year Founded
    2012
    HQ Location
    Tonsberg, Vestfold
    Twitter
    @GetCrypho
    760 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
Crypho Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Simple
1
Cons
Integration Issues
1
Crypho features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Crypho
Year Founded
2012
HQ Location
Tonsberg, Vestfold
Twitter
@GetCrypho
760 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®