Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated The Linux Unified Key Setup Alternatives

4 The Linux Unified Key Setup Reviews

4.9 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 The Linux Unified Key Setup Reviews
4.9 out of 5
4 The Linux Unified Key Setup Reviews
4.9 out of 5

The Linux Unified Key Setup Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Priyanka S.
PS
Human Resources Manager
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

Using LUKS for quiet some time and it has been very robust and reliable in securing the data on disk. It works seamlessly with most of distros like Fedora, ubuntu and even supported in virtual machines.

It has minimal performance impact for faster SSDs and excellent for dull disk encryption. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

Performance regression is observable for slower hard drives. It takes time to learn and get used to the setup, and its very difficult to mount these drives to windows os. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

Various Linux distros support LUKS right from the out of the box installation process. Provides data security using strong encryption algorithms. I appreciate the ability to manage multiple user keys, which adds an extra layer of security. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

For distros like Arch linux where one have to use command line interface, using LUKS in first go becomes painful experience. Decryption takes some cpu and recommended only for SSDs, older drives becomes more sluggish. Review collected by and hosted on G2.com.

VA
Informatic security
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

I like the hard disk encryption compatible with different Linux distributions, key generated by the Kernel. Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

Problems when losing hard disk partition, information is lost, missing master key in external token. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about The Linux Unified Key Setup?

most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability among different programs, but also assures that they all implement password management in a secure and documented manner Review collected by and hosted on G2.com.

What do you dislike about The Linux Unified Key Setup?

disadvantage — if the master key is not a trusted key, the encrypted key is only as secure as the user key used to encrypt it. Review collected by and hosted on G2.com.

There are not enough reviews of The Linux Unified Key Setup for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,053)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
2
Progress MOVEit Logo
Progress MOVEit
4.4
(459)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
3
Signal Logo
Signal
4.4
(444)
Making private communication simple.
4
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
5
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
6
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(261)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
7
Tresorit Logo
Tresorit
4.5
(233)
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
8
Kaspersky Endpoint Security for Business Logo
Kaspersky Endpoint Security for Business
4.3
(187)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
9
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
10
VeraCrypt Logo
VeraCrypt
4.5
(51)
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
Show More