Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated The Linux Unified Key Setup Alternatives

The Linux Unified Key Setup Reviews & Product Details

VA
Informatic security
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

I like the hard disk encryption compatible with different Linux distributions, key generated by the Kernel. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

Problems when losing hard disk partition, information is lost, missing master key in external token. Review collected by and hosted on G2.com.

What problems is The Linux Unified Key Setup solving and how is that benefiting you?

Key generated for different users without losing information or service data. Review collected by and hosted on G2.com.

The Linux Unified Key Setup Overview

What is The Linux Unified Key Setup?

Linux Unified Key Setup is a disk encryption specification for Linux.

The Linux Unified Key Setup Details
Show LessShow More
Product Description

Linux Unified Key Setup is a disk encryption specification for Linux.


Seller Details
HQ Location
N/A

Recent The Linux Unified Key Setup Reviews

Verified User
U
Verified UserEnterprise (> 1000 emp.)
5.0 out of 5
"Best and goto tool for disk encryption"
Various Linux distros support LUKS right from the out of the box installation process. Provides data security using strong encryption algorithms. I...
Priyanka S.
PS
Priyanka S.Enterprise (> 1000 emp.)
5.0 out of 5
"A robust tool for protecting data at rest"
Using LUKS for quiet some time and it has been very robust and reliable in securing the data on disk. It works seamlessly with most of distros like...
VA
Vanessa A.Small-Business (50 or fewer emp.)
4.5 out of 5
"Encrypt information"
I like the hard disk encryption compatible with different Linux distributions, key generated by the Kernel.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

The Linux Unified Key Setup Media

Answer a few questions to help the The Linux Unified Key Setup community
Have you used The Linux Unified Key Setup before?
Yes

3 out of 4 Total Reviews for The Linux Unified Key Setup

4.9 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

The Linux Unified Key Setup Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Priyanka S.
PS
Human Resources Manager
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

Using LUKS for quiet some time and it has been very robust and reliable in securing the data on disk. It works seamlessly with most of distros like Fedora, ubuntu and even supported in virtual machines.

It has minimal performance impact for faster SSDs and excellent for dull disk encryption. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

Performance regression is observable for slower hard drives. It takes time to learn and get used to the setup, and its very difficult to mount these drives to windows os. Review collected by and hosted on G2.com.

What problems is The Linux Unified Key Setup solving and how is that benefiting you?

Provides data security at rest for protecting against mishandling of sensitive data during physical steal/lost. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

Various Linux distros support LUKS right from the out of the box installation process. Provides data security using strong encryption algorithms. I appreciate the ability to manage multiple user keys, which adds an extra layer of security. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

For distros like Arch linux where one have to use command line interface, using LUKS in first go becomes painful experience. Decryption takes some cpu and recommended only for SSDs, older drives becomes more sluggish. Review collected by and hosted on G2.com.

What problems is The Linux Unified Key Setup solving and how is that benefiting you?

Allows encrypting all our files and content in our Linux machines providing more security and confidentiality to our data. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability among different programs, but also assures that they all implement password management in a secure and documented manner Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

disadvantage — if the master key is not a trusted key, the encrypted key is only as secure as the user key used to encrypt it. Review collected by and hosted on G2.com.

Recommendations to others considering The Linux Unified Key Setup:

none so far

Linux Unified Key Setup-on-disk-format (or LUKS) allows you to encrypt partitions on your Linux computer. This is particularly important when it comes to mobile computers and removable media. LUKS allows multiple user keys to decrypt a master key, which is used for the bulk encryption of the partition.

What LUKS does

LUKS encrypts entire block devices and is therefore well-suited for protecting the contents of mobile devices such as removable storage media or laptop disk drives.

The underlying contents of the encrypted block device are arbitrary. This makes it useful for encrypting swap devices. This can also be useful with certain databases that use specially formatted block devices for data storage.

LUKS uses the existing device mapper kernel subsystem.

LUKS provides passphrase strengthening which protects against dictionary attacks.

LUKS devices contain multiple key slots, allowing users to add backup keys or passphrases. Review collected by and hosted on G2.com.

What problems is The Linux Unified Key Setup solving and how is that benefiting you?

Trusted and encrypted keys are variable-length symmetric keys generated by the kernel that utilize the kernel keyring service. The fact that the keys never appear in user space in an unencrypted form means that their integrity can be verified, which in turn means that they can be used, for example, by the extended verification module (EVM) to verify and confirm the integrity of a running system. User-level programs can only ever access the keys in the form of encrypted blobs. Review collected by and hosted on G2.com.

There are not enough reviews of The Linux Unified Key Setup for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,053)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
2
Progress MOVEit Logo
Progress MOVEit
4.4
(459)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
3
Signal Logo
Signal
4.4
(444)
Making private communication simple.
4
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
5
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
6
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(261)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
7
Tresorit Logo
Tresorit
4.5
(233)
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
8
Kaspersky Endpoint Security for Business Logo
Kaspersky Endpoint Security for Business
4.3
(187)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
9
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
10
VeraCrypt Logo
VeraCrypt
4.5
(51)
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
Show More