Best Encryption Software - Page 2

BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings

Best Encryption Software At A Glance

Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
232 Listings in Encryption Available
(17)4.6 out of 5
10th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IXOPAY features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TokenEx
    Year Founded
    2010
    HQ Location
    Edmond, Oklahoma
    Twitter
    @TokenEx
    1,221 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 41% Mid-Market
IXOPAY features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
10.0
Policy Enforcement
Average: 8.6
Seller Details
Seller
TokenEx
Year Founded
2010
HQ Location
Edmond, Oklahoma
Twitter
@TokenEx
1,221 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(20)4.0 out of 5
View top Consulting Services for Oracle Advanced Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Advanced Security features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Data Encryption
    Average: 9.2
    8.8
    Document Encryption
    Average: 8.8
    8.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    823,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199,405 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 35% Mid-Market
Oracle Advanced Security features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
8.7
Data Encryption
Average: 9.2
8.8
Document Encryption
Average: 8.8
8.3
Policy Enforcement
Average: 8.6
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
823,886 Twitter followers
LinkedIn® Page
www.linkedin.com
199,405 employees on LinkedIn®
Ownership
NYSE:ORCL

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft SEAL features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.0
    Document Encryption
    Average: 8.8
    8.7
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,060,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 40% Enterprise
Microsoft SEAL features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.0
Document Encryption
Average: 8.8
8.7
Policy Enforcement
Average: 8.6
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,060,258 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(30)3.9 out of 5
14th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sophos Intercept X Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cybersecurity
    1
    Easy Installation
    1
    Easy Integrations
    1
    Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Intercept X features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,913 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,763 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
Sophos Intercept X Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cybersecurity
1
Easy Installation
1
Easy Integrations
1
Efficiency
1
Cons
This product has not yet received any negative sentiments.
Sophos Intercept X features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,913 Twitter followers
LinkedIn® Page
www.linkedin.com
4,763 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 7Z Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Setup Ease
    2
    Deployment Ease
    1
    Easy Integrations
    1
    Features
    1
    Cons
    Limited Features
    1
    Outdated Interface
    1
    Poor Interface Design
    1
    Poor Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 7Z features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.2
    8.5
    Document Encryption
    Average: 8.8
    7.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    7-Zip
    HQ Location
    N/A
    Twitter
    @7zip
    1,006 Twitter followers
Users
No information available
Industries
No information available
Market Segment
  • 57% Mid-Market
  • 29% Enterprise
7Z Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Setup Ease
2
Deployment Ease
1
Easy Integrations
1
Features
1
Cons
Limited Features
1
Outdated Interface
1
Poor Interface Design
1
Poor Usability
1
7Z features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.2
8.5
Document Encryption
Average: 8.8
7.3
Policy Enforcement
Average: 8.6
Seller Details
Seller
7-Zip
HQ Location
N/A
Twitter
@7zip
1,006 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

    Users
    • Consultant
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackBerry UEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    5
    Easy Access
    4
    File Sharing
    4
    Intuitive
    4
    Cons
    Expensive
    4
    Missing Features
    3
    Outdated Technology
    3
    Poor Interface
    3
    Poor Interface Design
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackBerry UEM features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1984
    HQ Location
    Waterloo, Ontario
    Twitter
    @BlackBerry
    3,819,667 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,844 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

Users
  • Consultant
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 27% Small-Business
BlackBerry UEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
5
Easy Access
4
File Sharing
4
Intuitive
4
Cons
Expensive
4
Missing Features
3
Outdated Technology
3
Poor Interface
3
Poor Interface Design
3
BlackBerry UEM features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
1984
HQ Location
Waterloo, Ontario
Twitter
@BlackBerry
3,819,667 Twitter followers
LinkedIn® Page
www.linkedin.com
2,844 employees on LinkedIn®
(39)3.7 out of 5
15th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Syman

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Encryption features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.1
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,799 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Syman

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Enterprise
  • 31% Mid-Market
Symantec Encryption features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
8.7
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.1
Policy Enforcement
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,799 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HashiCorp Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Integrations
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.2
    0.0
    Document Encryption
    Average: 8.8
    6.7
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    98,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,465 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Integrations
1
Security
1
Cons
This product has not yet received any negative sentiments.
HashiCorp Vault features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.2
0.0
Document Encryption
Average: 8.8
6.7
Policy Enforcement
Average: 8.6
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
98,001 Twitter followers
LinkedIn® Page
www.linkedin.com
2,465 employees on LinkedIn®
Ownership
NASDAQ: HCP
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cryptomator is a robust and innovative solution designed to empower individuals and organizations with the ability to secure their digital assets through the encryption of sensitive data in the realm

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 73% Small-Business
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cryptomator Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    2
    Ease of Use
    2
    Encryption Security
    2
    Setup Ease
    2
    Accessibility
    1
    Cons
    Access Issues
    1
    Expensive
    1
    File Management Issues
    1
    Limited Features
    1
    Limited Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cryptomator features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Data Encryption
    Average: 9.2
    9.8
    Document Encryption
    Average: 8.8
    7.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Skymatic
    Year Founded
    2016
    HQ Location
    Bonn, Germany
    Twitter
    @Cryptomator
    9,167 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cryptomator is a robust and innovative solution designed to empower individuals and organizations with the ability to secure their digital assets through the encryption of sensitive data in the realm

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 73% Small-Business
  • 27% Enterprise
Cryptomator Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
2
Ease of Use
2
Encryption Security
2
Setup Ease
2
Accessibility
1
Cons
Access Issues
1
Expensive
1
File Management Issues
1
Limited Features
1
Limited Integration
1
Cryptomator features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Data Encryption
Average: 9.2
9.8
Document Encryption
Average: 8.8
7.3
Policy Enforcement
Average: 8.6
Seller Details
Seller
Skymatic
Year Founded
2016
HQ Location
Bonn, Germany
Twitter
@Cryptomator
9,167 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    @work is a secure workplace collaboration suite designed to bring your whole company together at an optimum value.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • @work Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Ease of Use
    1
    Efficiency
    1
    Security
    1
    Task Management
    1
    Cons
    Difficult Navigation
    1
    Learning Curve
    1
    Performance Issues
    1
    Slow Speed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • @work features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    eUnite
    Year Founded
    2003
    HQ Location
    Irvine, US
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

@work is a secure workplace collaboration suite designed to bring your whole company together at an optimum value.

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
@work Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Ease of Use
1
Efficiency
1
Security
1
Task Management
1
Cons
Difficult Navigation
1
Learning Curve
1
Performance Issues
1
Slow Speed
1
@work features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
eUnite
Year Founded
2003
HQ Location
Irvine, US
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tor features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Data Encryption
    Average: 9.2
    7.8
    Document Encryption
    Average: 8.8
    8.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tor
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @torproject
    455,596 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 26% Mid-Market
Tor features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.6
Data Encryption
Average: 9.2
7.8
Document Encryption
Average: 8.8
8.6
Policy Enforcement
Average: 8.6
Seller Details
Seller
Tor
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@torproject
455,596 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
(51)4.5 out of 5
11th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 43% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeraCrypt features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.5
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VeraCrypt
    HQ Location
    Paris
    Twitter
    @VeraCrypt_IDRIX
    4,860 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 43% Enterprise
  • 35% Mid-Market
VeraCrypt features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.5
Policy Enforcement
Average: 8.6
Seller Details
Seller
VeraCrypt
HQ Location
Paris
Twitter
@VeraCrypt_IDRIX
4,860 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wickr Business is a collaborative messaging app for teams.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wickr Business features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wickr
    Year Founded
    2003
    HQ Location
    New York, NY
    Twitter
    @Wickr
    15 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wickr Business is a collaborative messaging app for teams.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
  • 25% Mid-Market
Wickr Business features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Wickr
Year Founded
2003
HQ Location
New York, NY
Twitter
@Wickr
15 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Folder Lock features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    9.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Beaverton, OR
    Twitter
    @NewSoftwaresInc
    2,127 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Folder Lock features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
9.6
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Beaverton, OR
Twitter
@NewSoftwaresInc
2,127 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iSecurity Field Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Encryption Security
    2
    Affordable
    1
    Customer Support
    1
    Data Protection
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Field Encryption features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.2
    8.3
    Document Encryption
    Average: 8.8
    8.9
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    501 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

Users
No information available
Industries
No information available
Market Segment
  • 73% Enterprise
  • 18% Small-Business
iSecurity Field Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Encryption Security
2
Affordable
1
Customer Support
1
Data Protection
1
Cons
Slow Performance
1
iSecurity Field Encryption features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.2
8.3
Document Encryption
Average: 8.8
8.9
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
501 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®