GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Encryption Software. Filters help you narrow down the results to find exactly what you’re looking for.
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them.
Read more about 1Password
MySQL is a relational database management system (RDBMS) designed to help businesses record, update, and manage data and deploy cloud-native applications. Features include data masking and de-identification, multi-document transaction support, intrusion detection, alerts & configuration management.
Read more about MySQL
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.
Read more about Symantec Endpoint Security
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.
Read more about TunnelBear
Code42's CrashPlan for Small Business is a global enterprise SaaS provider of endpoint data protection and security. Backup, restore and protect your data from anywhere with CrashPlan for Small Business.
Read more about CrashPlan
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.
Read more about Intercept X Endpoint
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.
Read more about Bitdefender GravityZone
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
eM Client is a powerful email client with a clean and easy-to-use interface, which supports PGP and S/MIME encryption and digital signatures. Upload and lookup GPG keys on eM Keybook, Proton and keys.openpgp.org. Password-protected startup. eM Client easily connects to any email service.
Read more about eM Client
MOVEit Managed File Transfer (MFT) software provides secure collaboration and automated file transfers of sensitive data. Organizations get complete visibility of all file transfers along with automated workflows that can replace scripting.
Read more about MOVEit
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities
Read more about Passportal
Cypherdog E-mail Encryption (CEE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Read more about Cypherdog E-mail Encryption
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.
In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.
Read more about OneLogin
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.
Read more about Citrix Workspace
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more
Read more about PureVPN
Acronis Cyber Protect Cloud is a unique integration of backup with comprehensive anti-malware protection and endpoint management tools. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down.
Read more about Acronis Cyber Protect Cloud
Hotspot Shield is a private VPN that provides secure and private internet access by encrypting personal browsing information. Securely browse and stream videos, games, shows, sports, and movies anywhere in HD quality.
Read more about Hotspot Shield VPN
GlassWire is a network monitoring and security platform that provides businesses with tools including real time network monitoring, a built-in firewall, internet security features, alerts, bandwidth usage monitoring, and more. It offers an Android app to allow users to monitor networks on-the-go.
Read more about GlassWire
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.
Read more about HMA
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.
Read more about Syxsense
Avira Antivirus Pro is a comprehensive antivirus program that protects the identity and personal data of its users against malware. It is available for PCs and smartphones. The aim of the platform is to help users achieve the highest level of security while maintaining unimpaired device performance.
Read more about Avira Antivirus Pro
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.
Read more about Automox
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.
Read more about ConnectWise SIEM
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.
Read more about Hushmail
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.
Read more about Black Duck
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.
Read more about NordLayer
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.
Read more about Qualys Cloud Platform
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more
Read more about EventSentry
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.
Read more about Bitium
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.
Read more about Invicti
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.
Read more about Files.com
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike
Keybase is a secure file sharing and messaging platform that utilizes end-to-end encryption to ensure that messages, photos, videos, and documents stay private. Keybase can connect social media identities across GitHub, Twitter, Reddit, and more to encryption keys that can be controlled in a central location.
Read more about Keybase
Indeni makes it easy to manage the infrastructure of digital businesses. Indeni Knowledge and Indeni Insight offers integrations to critical devices, built-in automation, and easy-to-read remediation instructions that allow IT users to move from reactive to proactive infrastructure management.
Read more about Indeni
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.
Read more about AwareGO
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.