Top Rated VeraCrypt Alternatives
Encryption is important to safeguard our files and personal data. I always place my files in Dropbox or Google drive, sometimes these files could be snooped by state actors or hackers and once they are in they will be able to read all of our company's sensitive documents. Veracrypt helps me create an encrypted and password protected capsule that can be sent via email or uploaded to any server and it gives us peace of mind that it is not being snooped. Sometimes we handle client's sensitive information on our end and they give us data in the form of a veracrypt volume, and this ensures safety of the data. Review collected by and hosted on G2.com.
Veracrypt's UI is not polished, a UI designer could be enlisted in this team to make the UI more user friendly. Veracrypt does not have a mobile or tablet app. A gmail integration would be godsend. Review collected by and hosted on G2.com.
50 out of 51 Total Reviews for VeraCrypt
Overall Review Sentiment for VeraCrypt
Log in to view review sentiment.
VeraCrypt allows you to create hidden volumes within encrypted partitions. This feature enables you to store sensitive data discreetly, providing an additional layer of security. It also supports steganography, allowing you to hide encrypted data within other files or containers. Review collected by and hosted on G2.com.
Encrypting and decrypting data can introduce a performance overhead, especially on older or low-end systems. While VeraCrypt is optimized for performance, it may still impact the speed of disk operations, particularly when working with large volumes of data. Review collected by and hosted on G2.com.
VC has a very robust and versatile toolchest. It has more and better options than some paid apps. Review collected by and hosted on G2.com.
I wish they would spiff up the GUI so they stay relevant. Sadly, appearances do make a difference even in the tech world. Review collected by and hosted on G2.com.

The most things I like about VerCrypt are as below:
1. If I want to encrypt a whole hard drive then It is possible in VeraCrypt and I like this feature very most among all other features.
2. The ability to establish a virtual encrypted disc within a document and afterward mounted the virtual encrypted disc as if it were a physical disc.
3. Availability of multiple algorithm options. Review collected by and hosted on G2.com.
The things I don't like much about VerCrypt are as below:
1. There is no integration for cloud storage.
2. There is no sharing option as well.
3. The UI is also outdated and not much user friendly. Sometimes face difficulty to find features options. Review collected by and hosted on G2.com.
Easy to set up and use while still being private. Free is also a big plus! Review collected by and hosted on G2.com.
It doesn't like it when multiple computers are trying to log in to the same folder. Review collected by and hosted on G2.com.

I like veracrypt, because it helps us to safely and effectively encrypt and archive our key digital files and properties. This addressed the security concerns that businesses or anyone else might have allowed digital files to be encrypted in a variety of ways. You would create an encryption buffer to transfer through devices or encrypt complete disks. Veracrypt is my favorite shortcoming and that of my coworkers, as it provides a wide array of functionality even more than you might expect in a free software of this kind. Review collected by and hosted on G2.com.
What I don't like in Veracript is mostly esthetic as I don't like the feel of program design personally is very simple and a little messy, I'd prefer it to have a more functional interface so there's nothing else that bothers me. Review collected by and hosted on G2.com.

The most importat facility of Veracrypt is that it is certainly a sophisticated application which requires specific attention that offers a way to encrypt our information which we find more sensitive, from compact and mountable capacities to full hard drives, ensuring absolute peace of mind and security because even if the computer fell into the wrong hands, effective Veracrypt authentication allows access worthless. In brief, VeraCrypt makes not only straightforward to decode encryption, but is almost impossible. Review collected by and hosted on G2.com.
I don't like much that I could only claim and agree that my knowledge of using different devices renders it less user-friendly than the alternative if you only need to encrypt files and folders and it needs setup and some amount of training to encrypt full systems, rest for all the other advantages that I'm pleased with to present. Review collected by and hosted on G2.com.

Veracrypt is an exceptional technology that allows you to encrypt files for storage. One of the main advantages is the ability to encrypt an unlimited number of hard drives or portable devices with Veracrypt, enabling you to securely transfer sensitive information between workplace and home. Veracrypt has various encryption techniques and offers users the ability to create a hidden partition, which is very useful when sharing a laptop or sending information securely. The application has accessible source code, making it completely free for everyone on the most common systems. Users are given the option to encrypt the device's partition. Review collected by and hosted on G2.com.
The biggest weakness of Veracrypt is an outdated model that makes the system non-transparent, making it difficult to find certain functions. The configuration is quite difficult, and understanding the tool requires a lot of time. Review collected by and hosted on G2.com.

The encryption of our files and personal details is important in order to secure them. I still insert my files on the drive of Dropbox or Google, some of which can be blown up by state actors or hackers and once inside, you can read all sensitive documents of our business. Veracrypt enables me to create an encrypted capsules that are password-protected and that can be sent via an e-mail or uploaded to any server. Often we treat customer sensitive information about our intent and provide us with data in the form of veracrypt volumes, ensuring data security. Review collected by and hosted on G2.com.
Veracrypt user interface is not polished, this team can include a UI designer to make the user friendlier. There isn't a smartphone or tablet app on Veracrypt. Gmail would be a godsend to implement. Review collected by and hosted on G2.com.

I really like veracrypt because it allows us to encrypt and store our most important digital files and assets in a safe and effective way. It serves to solve the security concerns that companies or any common person may have allows to encrypt digital files in several ways, I can create an encryption container that I can move between media or encrypt entire disks. in short veracrypt is my favorite and that of my colleagues because it offers a wide range of features, much more than you would expect in a completely free program like this. Review collected by and hosted on G2.com.
What I dislike about veracrypt is mainly at the aesthetic level since I personally do not like the appearance of the program design is very minimalist and a bit chaotic I would like it to have a new interface more in line with all the good that it really offers so There is nothing else that upsets me. Review collected by and hosted on G2.com.

With the development of technology and software, the number of threats we may encounter is continuously increasing, with some consumers demanding more. "You own a company that wants to keep privileged information confidential or just a person who cares about security, encryption adds a whole new security component to your personal information. Encryption rewrites your files into hidden code, requiring access to a password to unlock them. There are many brands of encryption software available today, but many of them are expensive and scaled only to meet the requirements of large companies. Unlike software such as BitLocker, VeraCrypt does not require a Windows Pro or Enterprise version to work, and its versatility makes it scalable to your needs, regardless of whether you want to encrypt a single file or the entire computer disk. VeraCrypt is intended to be used in all versions of the Windows operating system but also works well on Linux and macOS distributions.
The codes used to hide files are called ciphers, and no two are created in the same way. TwoFish, Serpent, and AES are supported in VeraCrypt and are considered one of the most reliable ciphers. VeraCrypt is also an open-source project. This offers several significant advantages. Because everyone can work with VeraCrypt, the tools it runs on are more transparent, and security gaps can be identified and fixed more effectively thanks to this higher level of control. Review collected by and hosted on G2.com.
Requires installation, configuration, and a certain level of encryption knowledge to choose the optimal configuration. Review collected by and hosted on G2.com.