Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Top Rated The Data Krypter Alternatives

The Data Krypter Reviews & Product Details

The Data Krypter Overview

What is The Data Krypter?

The easy way to keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can't decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -recovery any lost keys or master password with the Data Recovery module <== NEW -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -both types of encryption are quantum proof -send encrypted emails by encrypting the text then pasting it into an email -no back door

The Data Krypter Details
Languages Supported
English
Show LessShow More
Product Description

Keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can't decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -no back door


Seller Details
HQ Location
Toronto, CA
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

B. Louie C.
BC
Overview Provided by:
President at Nuverb Systems Inc
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
1 person requested security information

The Data Krypter Media

The Data Krypter Demo - Main Window
The main window of the Data Krypter. Click on each icon to encrypt, decrypt, change settings and create a public/private key.
The Data Krypter Demo - Encrypt a file/folder
The window where you choose what file/folder to encrypt, the type of encryption, where to save the encrypted file/folder and other options.
The Data Krypter Demo - Decrypt a file/folder
The window where you choose what file/folder to decrypt, whether to save the decrypted file/folder or just view it and other options.
The Data Krypter Demo - Encrypt Text
The window where you encrypt some text, the type of encryption. The encrypted text can then be pasted into another application such as an email.
Answer a few questions to help the The Data Krypter community
Have you used The Data Krypter before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of The Data Krypter for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,052)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
2
Proofpoint Email Security and Protection Logo
Proofpoint Email Security and Protection
4.6
(548)
Proofpoint Email Security and Protection stops malware and non-malware threats such as impostor email.
3
Progress MOVEit Logo
Progress MOVEit
4.4
(459)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
4
Signal Logo
Signal
4.4
(444)
Making private communication simple.
5
Paubox Logo
Paubox
4.9
(397)
Paubox is an easy way to send and receive HIPAA compliant email.
6
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
7
Avanan Cloud Email Security Logo
Avanan Cloud Email Security
4.7
(352)
AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.
8
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
9
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(261)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
10
Spike Logo
Spike
4.6
(234)
Spike focuses on the features that save you time. Unified inbox, team collaboration, real-time awareness & more in a single productivity app.
Show More