Best Software for 2025 is now live!
|| products.size

Best Encryption Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. Encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings

Best Encryption Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
232 Listings in Encryption Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SWISS SECURIUM is a secure platform for communication and collaboration.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Small-Business
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SWISS SECURIUM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Ease of Use
    1
    Easy Sharing
    1
    Security
    1
    Cons
    Connectivity Issues
    1
    Expensive
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SWISS SECURIUM features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Stein am Rhein
    Twitter
    @ALPEINSoftSWISS
    26 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SWISS SECURIUM is a secure platform for communication and collaboration.

Users
No information available
Industries
No information available
Market Segment
  • 70% Small-Business
  • 30% Enterprise
SWISS SECURIUM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Ease of Use
1
Easy Sharing
1
Security
1
Cons
Connectivity Issues
1
Expensive
1
Performance Issues
1
SWISS SECURIUM features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Stein am Rhein
Twitter
@ALPEINSoftSWISS
26 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Folder Lock features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    9.6
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Beaverton, OR
    Twitter
    @NewSoftwaresInc
    2,130 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Folder Lock features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
9.6
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Beaverton, OR
Twitter
@NewSoftwaresInc
2,130 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stop unauthorised access to your important files and documents with the world’s strongest encryption. Encrypt your files and folders, protect your customer data and business IP, secure document collab

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GhostVolt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Affordable
    1
    Cloud Storage
    1
    Compliance
    1
    Data Protection
    1
    Cons
    Integration Difficulty
    1
    Integration Issues
    1
    Limited Integration
    1
    Poor Interface Design
    1
    Slow Loading
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GhostVolt features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Data Encryption
    Average: 9.2
    9.4
    Document Encryption
    Average: 8.8
    8.8
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Cambridge, MA
    Twitter
    @GhostVolt_
    85 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stop unauthorised access to your important files and documents with the world’s strongest encryption. Encrypt your files and folders, protect your customer data and business IP, secure document collab

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
GhostVolt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Affordable
1
Cloud Storage
1
Compliance
1
Data Protection
1
Cons
Integration Difficulty
1
Integration Issues
1
Limited Integration
1
Poor Interface Design
1
Slow Loading
1
GhostVolt features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.8
Data Encryption
Average: 9.2
9.4
Document Encryption
Average: 8.8
8.8
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2018
HQ Location
Cambridge, MA
Twitter
@GhostVolt_
85 Twitter followers
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogMeOnce features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    10.0
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LogmeOnce
    Year Founded
    2011
    HQ Location
    McLean, VA
    Twitter
    @LogmeOnce
    9,676 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
LogMeOnce features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
10.0
Policy Enforcement
Average: 8.6
Seller Details
Seller
LogmeOnce
Year Founded
2011
HQ Location
McLean, VA
Twitter
@LogmeOnce
9,676 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
(19)4.4 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Crypho Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Crypho features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Crypho
    Year Founded
    2012
    HQ Location
    Tonsberg, Vestfold
    Twitter
    @GetCrypho
    758 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
Crypho Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Simple
1
Cons
Integration Issues
1
Crypho features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Crypho
Year Founded
2012
HQ Location
Tonsberg, Vestfold
Twitter
@GetCrypho
758 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dropvault is a secure team collaboration and document sharing platform. With Dropvault every conversation, note, comment or document shared with your team or your customer is encrypted with a key that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dropvault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    File Sharing
    3
    Security
    3
    Ease of Use
    2
    Team Collaboration
    2
    Communication
    1
    Cons
    Expensive
    2
    Integration Issues
    1
    Time-Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dropvault features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Apptimi
    Year Founded
    2015
    HQ Location
    London, England
    Twitter
    @Apptimi
    214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dropvault is a secure team collaboration and document sharing platform. With Dropvault every conversation, note, comment or document shared with your team or your customer is encrypted with a key that

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Dropvault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
File Sharing
3
Security
3
Ease of Use
2
Team Collaboration
2
Communication
1
Cons
Expensive
2
Integration Issues
1
Time-Consumption
1
Dropvault features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Apptimi
Year Founded
2015
HQ Location
London, England
Twitter
@Apptimi
214 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Mid-Market
    • 10% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DiskCryptor features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.7
    Data Encryption
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
Product Description
How are these determined?Information
This description is provided by the seller.

DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

Users
No information available
Industries
No information available
Market Segment
  • 90% Mid-Market
  • 10% Enterprise
DiskCryptor features and usability ratings that predict user satisfaction
0.0
No information available
9.7
Data Encryption
Average: 9.2
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RealTyme is a communication and collaboration platform with security, privacy and humane technology at its core. Chat, call, meet & share, all within one trusted platform. Teams will increase focu

    Users
    No information available
    Industries
    • Marketing and Advertising
    Market Segment
    • 73% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Realtyme Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Security
    2
    Customer Support
    1
    Efficiency
    1
    Features
    1
    Cons
    Customer Support
    1
    File Sharing Issues
    1
    Screen Sharing
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Realtyme features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Adeya SA.
    Year Founded
    2007
    HQ Location
    Morges
    Twitter
    @adeyasecure
    134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RealTyme is a communication and collaboration platform with security, privacy and humane technology at its core. Chat, call, meet & share, all within one trusted platform. Teams will increase focu

Users
No information available
Industries
  • Marketing and Advertising
Market Segment
  • 73% Small-Business
  • 27% Mid-Market
Realtyme Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Security
2
Customer Support
1
Efficiency
1
Features
1
Cons
Customer Support
1
File Sharing Issues
1
Screen Sharing
1
Realtyme features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Adeya SA.
Year Founded
2007
HQ Location
Morges
Twitter
@adeyasecure
134 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
(11)4.2 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GnuPG features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GnuPG
    HQ Location
    N/A
Product Description
How are these determined?Information
This description is provided by the seller.

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 36% Enterprise
GnuPG features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
GnuPG
HQ Location
N/A
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeChats — is a cross-platform solution, which ensures a military-grade security of your business and private communications. SafeChats either can be used as a standalone solution or can be integrate

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeChats features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeChats
    Year Founded
    2019
    HQ Location
    Taipei, TW
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeChats — is a cross-platform solution, which ensures a military-grade security of your business and private communications. SafeChats either can be used as a standalone solution or can be integrate

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
SafeChats features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SafeChats
Year Founded
2019
HQ Location
Taipei, TW
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 47% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keybase features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    5.0
    Data Encryption
    Average: 9.2
    5.0
    Document Encryption
    Average: 8.8
    4.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keybase
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the

Users
No information available
Industries
  • Computer Software
Market Segment
  • 53% Small-Business
  • 47% Mid-Market
Keybase features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
5.0
Data Encryption
Average: 9.2
5.0
Document Encryption
Average: 8.8
4.4
Policy Enforcement
Average: 8.6
Seller Details
Seller
Keybase
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Encrypted, Private, Secure, Calls and Chats on Android and Apple iOS. StealthChat is an industrial strength chat app for professionals that value real privacy and security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 59% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StealthChat: Private Messaging features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Campbell, CA
    Twitter
    @MailSite
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Encrypted, Private, Secure, Calls and Chats on Android and Apple iOS. StealthChat is an industrial strength chat app for professionals that value real privacy and security

Users
No information available
Industries
No information available
Market Segment
  • 59% Small-Business
  • 29% Mid-Market
StealthChat: Private Messaging features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1995
HQ Location
Campbell, CA
Twitter
@MailSite
6 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sensitive Data Discovery, Data Masking. Access Controls.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mage Privacy Enhancing Technologies features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Data Encryption
    Average: 9.2
    9.2
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mage
    Year Founded
    2014
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    88 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sensitive Data Discovery, Data Masking. Access Controls.

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
Mage Privacy Enhancing Technologies features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.6
Data Encryption
Average: 9.2
9.2
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Seller
Mage
Year Founded
2014
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
88 employees on LinkedIn®
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication in companies and organizations. The messaging app is easy to use and doesn’t require a phone number

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Threema Work Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Communication
    2
    Ease of Use
    2
    Centralized Management
    1
    Compliance
    1
    Cons
    Limited Features
    2
    Complexity
    1
    Expensive
    1
    File Sharing Issues
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threema Work features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Data Encryption
    Average: 9.2
    6.7
    Document Encryption
    Average: 8.8
    6.7
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Wilmington, US
    Twitter
    @ThreemaApp
    25,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication in companies and organizations. The messaging app is easy to use and doesn’t require a phone number

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Threema Work Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Communication
2
Ease of Use
2
Centralized Management
1
Compliance
1
Cons
Limited Features
2
Complexity
1
Expensive
1
File Sharing Issues
1
Learning Curve
1
Threema Work features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
6.7
Data Encryption
Average: 9.2
6.7
Document Encryption
Average: 8.8
6.7
Policy Enforcement
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
Wilmington, US
Twitter
@ThreemaApp
25,298 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuricVault Tokenization is a payment processing software that associates tokens with secure encrypted data. It encrypts the data it receives and then stores the encrypted data along with a random set

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuricVault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    1
    Configuration Flexibility
    1
    Data Protection
    1
    Data Security
    1
    Encryption
    1
    Cons
    Cybersecurity Risks
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuricVault features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.2
    10.0
    Document Encryption
    Average: 8.8
    9.4
    Policy Enforcement
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @TokenEx
    1,229 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

AuricVault Tokenization is a payment processing software that associates tokens with secure encrypted data. It encrypts the data it receives and then stores the encrypted data along with a random set

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Enterprise
AuricVault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
1
Configuration Flexibility
1
Data Protection
1
Data Security
1
Encryption
1
Cons
Cybersecurity Risks
1
Poor Customer Support
1
AuricVault features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.2
10.0
Document Encryption
Average: 8.8
9.4
Policy Enforcement
Average: 8.6
Seller Details
Twitter
@TokenEx
1,229 Twitter followers