G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.
Difenso offers major groups, small companies and individuals an innovative and uniquely designed solution, easy to implement to protect all shared data.
DQ0 is a platform for Ethical AI and Trustworty Analytics. It guarantees the protection of your data through Differential Privacy. You maintain complete control over your data and anybody can use it f
East-tec SafeBit is an on-the-fly disk encryption software designed to protect your confidential data by creating secure, password-protected virtual drives. These encrypted "safes" appear and function
E-Lock is a pioneer in the field of PKI-based digital signature solutions with many well known customers across the globe. Be it a large enterprise, a small business, or an individual looking for reli
Encrypto lets you encrypt files before sending them to friends or coworkers. Drop a file into Encrypto, set a password, and then send it with added security.
KAPALYA empowers organizations and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application. This ubiqu
Entropy Keycrypt ensures a seamless and secure transition of your valuable information to your trusted circle in unforeseen circumstances.
Enveil's ZeroReveal products protect Data in Use, ensuring that nothing is ever revealed during the entire processing lifecycle.
FinalCode provides comprehensive file security that works throughout the file lifecycle and within an enterprise's existing file sharing infrastructure and applications.
FinalCode' persistent file security platform protects your CAD information no matter how files are shared inside and outside of your organization. The platform lets organizations, engineers, and desig
Capnion’s unique protocol is called Ghost PII and it focuses on personally identifiable information (or PII) like name, address, etc. Replace the PII in your pipelines now with encrypted data that, l
Confidential Computing Protect data in-use with Confidential VMs, Confidential GKE, Confidential Dataflow, Confidential Dataproc, and Confidential Space.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.
Secure your confidential files and folders. Hide Files is a folder-locker utility. You can encrypt and decrypt your sensitive documents, photo albums, videos, emails and any kind of data. You can pass
Post-Quantum is the leading business developing protection against the quantum threat and offering a range of unique commercial and government solutions.