Best Encryption Software - Page 4

BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings

Best Encryption Software At A Glance

Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
232 Listings in Encryption Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sealit protects confidential information. Our password-less Zero Trust encryption allows you to secure all sensitive communication with your team and clients with just one click. Sealit seamlessly int

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sealit features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sealit
    HQ Location
    London, England
    Twitter
    @mysealitid
    1,761 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sealit protects confidential information. Our password-less Zero Trust encryption allows you to secure all sensitive communication with your team and clients with just one click. Sealit seamlessly int

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Sealit features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
10.0
Policy Enforcement
Average: 8.6
Seller Details
Seller
Sealit
HQ Location
London, England
Twitter
@mysealitid
1,761 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safely share passwords, tokens, credit cards, and anything else in ShareSecret's short-term, auto-expiring encrypted vault.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ShareSecret Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Secure Sharing
    4
    Security
    3
    Customer Support
    2
    Data Protection
    2
    Ease of Use
    2
    Cons
    Limited Features
    2
    Limited Storage
    2
    Learning Curve
    1
    Limited Customization
    1
    Mobile Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ShareSecret features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Data Encryption
    Average: 9.2
    8.1
    Document Encryption
    Average: 8.8
    6.9
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Los Angeles, US
    Twitter
    @sharesecretapp
    24 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safely share passwords, tokens, credit cards, and anything else in ShareSecret's short-term, auto-expiring encrypted vault.

Users
No information available
Industries
No information available
Market Segment
  • 43% Small-Business
  • 29% Mid-Market
ShareSecret Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Secure Sharing
4
Security
3
Customer Support
2
Data Protection
2
Ease of Use
2
Cons
Limited Features
2
Limited Storage
2
Learning Curve
1
Limited Customization
1
Mobile Limitations
1
ShareSecret features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 8.9
8.9
Data Encryption
Average: 9.2
8.1
Document Encryption
Average: 8.8
6.9
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2016
HQ Location
Los Angeles, US
Twitter
@sharesecretapp
24 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automaticall

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Strac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    20
    Data Security
    19
    Customer Support
    18
    Security
    18
    Ease of Use
    17
    Cons
    Limited Features
    3
    Authentication Issues
    1
    Inefficient Search Functionality
    1
    Limitations
    1
    Limited Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strac features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    7.5
    Document Encryption
    Average: 8.8
    6.7
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Strac
    Year Founded
    2021
    HQ Location
    Bellevue, Washington
    Twitter
    @securewithstrac
    83 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automaticall

Users
No information available
Industries
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
Strac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
20
Data Security
19
Customer Support
18
Security
18
Ease of Use
17
Cons
Limited Features
3
Authentication Issues
1
Inefficient Search Functionality
1
Limitations
1
Limited Compatibility
1
Strac features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
7.5
Document Encryption
Average: 8.8
6.7
Policy Enforcement
Average: 8.6
Seller Details
Seller
Strac
Year Founded
2021
HQ Location
Bellevue, Washington
Twitter
@securewithstrac
83 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WinMagic features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    WinMagic
    Year Founded
    1997
    HQ Location
    Mississauga, Ontario
    Twitter
    @WinMagic
    1,609 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
WinMagic features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
10.0
Policy Enforcement
Average: 8.6
Seller Details
Seller
WinMagic
Year Founded
1997
HQ Location
Mississauga, Ontario
Twitter
@WinMagic
1,609 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enigma Vault is a SaaS based payment card, data (plaintext), and file tokenization solution. You provide the data, we provide the token. For payment cards we have secure entry forms that can be embedd

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Enigma Vault features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Data Encryption
    Average: 9.2
    9.7
    Document Encryption
    Average: 8.8
    9.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @enigmavault
    7 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enigma Vault is a SaaS based payment card, data (plaintext), and file tokenization solution. You provide the data, we provide the token. For payment cards we have secure entry forms that can be embedd

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Enigma Vault features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
9.3
Data Encryption
Average: 9.2
9.7
Document Encryption
Average: 8.8
9.6
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2020
HQ Location
New York, US
Twitter
@enigmavault
7 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    0.0
    No information available
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
0.0
No information available
10.0
Policy Enforcement
Average: 8.6
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,181 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PCI Vault is a vendor neutral, zero-knowledge, PCI DSS level 1 compliant environment by SnapBill, Inc. It is a SaaS solution offering credit card Tokenization as a Service (TaaS) combined with it's ow

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PCI Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Compliance
    4
    Data Protection
    4
    Ease of Use
    3
    Encryption
    3
    Cons
    Complexity Issues
    2
    Expensive
    2
    Slow Performance
    2
    Connectivity Issues
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PCI Vault features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    8.8
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Wilmington, US
    Twitter
    @pcicards
    2 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PCI Vault is a vendor neutral, zero-knowledge, PCI DSS level 1 compliant environment by SnapBill, Inc. It is a SaaS solution offering credit card Tokenization as a Service (TaaS) combined with it's ow

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
PCI Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Compliance
4
Data Protection
4
Ease of Use
3
Encryption
3
Cons
Complexity Issues
2
Expensive
2
Slow Performance
2
Connectivity Issues
1
Poor Customer Support
1
PCI Vault features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
8.8
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2008
HQ Location
Wilmington, US
Twitter
@pcicards
2 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protegrity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Stamford, US
    Twitter
    @Protegrity
    4,561 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    378 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 29% Enterprise
Protegrity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
10.0
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
1996
HQ Location
Stamford, US
Twitter
@Protegrity
4,561 Twitter followers
LinkedIn® Page
www.linkedin.com
378 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    An easy-to-use utility that keeps files securely encrypted on disk. Your decrypted files are available at your fingertips - yet always remain encrypted on disk. Free for Personal and Commercial Use.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AES Drive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AES Drive features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.2
    8.3
    Document Encryption
    Average: 8.8
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Chapel Hill, NC
    Twitter
    @nsoftware
    1,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

An easy-to-use utility that keeps files securely encrypted on disk. Your decrypted files are available at your fingertips - yet always remain encrypted on disk. Free for Personal and Commercial Use.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
AES Drive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Cons
Slow Performance
1
AES Drive features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.2
8.3
Document Encryption
Average: 8.8
10.0
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
1994
HQ Location
Chapel Hill, NC
Twitter
@nsoftware
1,914 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AxCrypt is a SaaS-based encryption software designed to secure files and protect sensitive data. It provides AES-256 encryption, allowing users to encrypt, decrypt, and securely share files with indiv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AxCrypt features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    9.6
    Document Encryption
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AxCrypt
    Year Founded
    2014
    HQ Location
    Stockholm, Stockholm County
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AxCrypt is a SaaS-based encryption software designed to secure files and protect sensitive data. It provides AES-256 encryption, allowing users to encrypt, decrypt, and securely share files with indiv

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
AxCrypt features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
9.6
Document Encryption
Average: 8.8
0.0
No information available
Seller Details
Seller
AxCrypt
Year Founded
2014
HQ Location
Stockholm, Stockholm County
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Leading Security Solution for Open Source Database

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MyDiamo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Encryption
    2
    Safety
    2
    Data Protection
    1
    Ease of Use
    1
    Cons
    Complex Setup
    2
    Expensive
    2
    Slow Performance
    2
    Complexity Issues
    1
    Email Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MyDiamo features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    8.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    LinkedIn® Page
    www.linkedin.com
    79 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Leading Security Solution for Open Source Database

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 42% Small-Business
MyDiamo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Encryption
2
Safety
2
Data Protection
1
Ease of Use
1
Cons
Complex Setup
2
Expensive
2
Slow Performance
2
Complexity Issues
1
Email Issues
1
MyDiamo features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
8.3
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
1997
LinkedIn® Page
www.linkedin.com
79 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetAppStorage Encryption (NSE) is NetApp implementation of full-disk encryption (FDE) using self-encrypting drives from leading vendors.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetApp Storage Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Configuration Flexibility
    1
    Easy Integrations
    1
    Features
    1
    Cons
    Complex Setup
    1
    Encryption Issues
    1
    Key Recovery
    1
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetApp Storage Encryption features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.9
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    121,047 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,942 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

NetAppStorage Encryption (NSE) is NetApp implementation of full-disk encryption (FDE) using self-encrypting drives from leading vendors.

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 20% Mid-Market
NetApp Storage Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Configuration Flexibility
1
Easy Integrations
1
Features
1
Cons
Complex Setup
1
Encryption Issues
1
Key Recovery
1
Learning Difficulty
1
NetApp Storage Encryption features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.9
Policy Enforcement
Average: 8.6
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
121,047 Twitter followers
LinkedIn® Page
www.linkedin.com
12,942 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs' code.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • STunnel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Encryption Security
    3
    Security
    3
    Accessibility
    2
    Ease of Use
    2
    Encryption
    2
    Cons
    Slow Performance
    3
    Complex Setup
    1
    Cybersecurity Risks
    1
    Encryption Issues
    1
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • STunnel features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Data Encryption
    Average: 9.2
    8.3
    Document Encryption
    Average: 8.8
    8.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    STunnel
Product Description
How are these determined?Information
This description is provided by the seller.

Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs' code.

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 20% Enterprise
STunnel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Encryption Security
3
Security
3
Accessibility
2
Ease of Use
2
Encryption
2
Cons
Slow Performance
3
Complex Setup
1
Cybersecurity Risks
1
Encryption Issues
1
Learning Difficulty
1
STunnel features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Data Encryption
Average: 9.2
8.3
Document Encryption
Average: 8.8
8.3
Policy Enforcement
Average: 8.6
Seller Details
Seller
STunnel
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acra security suite is the first choice proactive security toolbox for preventing real-world data leakage risks, encrypting and decrypting data between application and database, and complying to encry

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acra Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    2
    Compliance
    1
    Compliance Management
    1
    Data Security
    1
    Ease of Use
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Complexity Issues
    1
    Poor Customer Support
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acra features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.2
    7.5
    Document Encryption
    Average: 8.8
    8.3
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, England
    Twitter
    @cossacklabs
    2,537 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acra security suite is the first choice proactive security toolbox for preventing real-world data leakage risks, encrypting and decrypting data between application and database, and complying to encry

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 36% Small-Business
Acra Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
2
Compliance
1
Compliance Management
1
Data Security
1
Ease of Use
1
Cons
Complex Configuration
1
Complexity
1
Complexity Issues
1
Poor Customer Support
1
Poor Interface Design
1
Acra features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.2
7.5
Document Encryption
Average: 8.8
8.3
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2014
HQ Location
London, England
Twitter
@cossacklabs
2,537 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key manage

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Data Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    9.2
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    710,071 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key manage

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 25% Enterprise
IBM Guardium Data Encryption features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
9.2
Policy Enforcement
Average: 8.6
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
710,071 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM