Introducing G2.ai, the future of software buying.Try now

Best Encryption Software - Page 12

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings
Show More
Show Less

Featured Encryption Software At A Glance

Free Plan Available:
Tresorit
Sponsored
Highest Performer:
Show LessShow More
Highest Performer:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
241 Listings in Encryption Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM's Fully Homomorphic Encryption (FHE technology enables computations on encrypted data without the need for decryption, ensuring data remains secure throughout processing. This advancement allows o

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Fully Homomorphic Encyrption (FHE) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM's Fully Homomorphic Encryption (FHE technology enables computations on encrypted data without the need for decryption, ensuring data remains secure throughout processing. This advancement allows o

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IBM Fully Homomorphic Encyrption (FHE) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,117 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Inpher's XOR Secret Computing Engine is a cutting-edge solution designed to enable secure, privacy-preserving computations on sensitive data without exposing it. By leveraging advanced cryptographic t

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Inpher XOR Secret Computing Engine features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Inpher
    Year Founded
    2015
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Inpher's XOR Secret Computing Engine is a cutting-edge solution designed to enable secure, privacy-preserving computations on sensitive data without exposing it. By leveraging advanced cryptographic t

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Inpher XOR Secret Computing Engine features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Inpher
Year Founded
2015
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Easily share sensitive information with co-workers, clients, friends and family.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InPrivy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Easily share sensitive information with co-workers, clients, friends and family.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
InPrivy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InterCrypto's Advanced Encryption Package (AEP 2025) is a comprehensive file encryption software designed for Windows 11 and Windows 10 users. It offers robust security features to protect sensitive d

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InterCrypto Advanced Encryption Package features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InterCrypto's Advanced Encryption Package (AEP 2025) is a comprehensive file encryption software designed for Windows 11 and Windows 10 users. It offers robust security features to protect sensitive d

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
InterCrypto Advanced Encryption Package features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InterCrypto's CryptoExpert is a robust data encryption software designed for Windows users seeking to secure their sensitive information. By creating password-protected virtual drives, CryptoExpert en

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InterCrypto CryptoExpert features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InterCrypto's CryptoExpert is a robust data encryption software designed for Windows users seeking to secure their sensitive information. By creating password-protected virtual drives, CryptoExpert en

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
InterCrypto CryptoExpert features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    east-tec InvisibleSecrets is a comprehensive privacy suite that protects your files using a unique, two-layered approach: strong encryption combined with steganography. While military-grade encryption

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InvisibleSecrets features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    East-Tec
    Year Founded
    1997
    HQ Location
    Oradea, RO
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

east-tec InvisibleSecrets is a comprehensive privacy suite that protects your files using a unique, two-layered approach: strong encryption combined with steganography. While military-grade encryption

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
InvisibleSecrets features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
East-Tec
Year Founded
1997
HQ Location
Oradea, RO
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Boulder, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Boulder, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iScramble is a PHP script that allows you to protect sections of your HTML code from prying eyes. It scrambles the text into a form that is not human readable, and generates some JavaScript code to de

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iScramble features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Z-Host
    Year Founded
    2002
    HQ Location
    United Kingdom
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iScramble is a PHP script that allows you to protect sections of your HTML code from prying eyes. It scrambles the text into a form that is not human readable, and generates some JavaScript code to de

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
iScramble features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Z-Host
Year Founded
2002
HQ Location
United Kingdom
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @KaymeraTech
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CipherFort is a military-grade secure device based on high-end off the shelf devices that ensures complete protection against all mobile threat and attack vectors. CipherFort's benefits include secure

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Kaymera Secure Calls and Chats features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@KaymeraTech
182 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kindite opens up the cloud for enterprises and regulated organizations, overcoming risks of privacy, compliance and control using disruptive encryption technology.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kindite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kindite
    Year Founded
    2017
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kindite opens up the cloud for enterprises and regulated organizations, overcoming risks of privacy, compliance and control using disruptive encryption technology.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kindite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kindite
Year Founded
2017
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kruptos 2 Software., a global leader in cross-platform data protection solutions, makes it simple for businesses, governments, and individuals to use and protect their most sensitive important data wh

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kruptos 2 Professional features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Tyne and Wear, United Kingdom
    Twitter
    @Kruptos2
    45 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kruptos 2 Software., a global leader in cross-platform data protection solutions, makes it simple for businesses, governments, and individuals to use and protect their most sensitive important data wh

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kruptos 2 Professional features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Tyne and Wear, United Kingdom
Twitter
@Kruptos2
45 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kryptel is file encryption software designed for reliable protection of sensitive data.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kryptel features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kryptel is file encryption software designed for reliable protection of sensitive data.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kryptel features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LifeReady is the platform to aggregate, curate and encrypt critical information using proprietary KeyCrypt™ technology to ensure your information is secure. We empower individuals, professional accoun

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LifeReady KeyCrypt features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LifeReady
    Year Founded
    2019
    HQ Location
    Melbourne, AU
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LifeReady is the platform to aggregate, curate and encrypt critical information using proprietary KeyCrypt™ technology to ensure your information is secure. We empower individuals, professional accoun

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LifeReady KeyCrypt features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
LifeReady
Year Founded
2019
HQ Location
Melbourne, AU
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LIKEY is a robustly secured mobile keypad designed to safeguard user information by creating one-time generated keypad while guaranteeing the convenience of server management. LIKEY also allows flexib

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LIKEY features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Seongnam-si,Gyeonggi-do
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LIKEY is a robustly secured mobile keypad designed to safeguard user information by creating one-time generated keypad while guaranteeing the convenience of server management. LIKEY also allows flexib

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LIKEY features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Seongnam-si,Gyeonggi-do
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lorica enables private AI through end-to-end encrypted data processing, empowering organizations to leverage advanced AI

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lorica Cybersecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lorica
    Year Founded
    2017
    HQ Location
    Toronto, CA
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lorica enables private AI through end-to-end encrypted data processing, empowering organizations to leverage advanced AI

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Lorica Cybersecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Lorica
Year Founded
2017
HQ Location
Toronto, CA
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®