Introducing G2.ai, the future of software buying.Try now

Best Encryption Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings
Show More
Show Less

Featured Encryption Software At A Glance

Free Plan Available:
Tresorit
Sponsored
Highest Performer:
Show LessShow More
Highest Performer:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
241 Listings in Encryption Available
(47)4.7 out of 5
8th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

    Users
    • Software Engineer
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 51% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VGS Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Audit Management
    1
    Compliance
    1
    Compliance Management
    1
    Customer Support
    1
    Customizability
    1
    Cons
    Limited Functionality
    1
    Manual Intervention Required
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VGS Platform features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.8
    Data Encryption
    Average: 9.3
    8.9
    Document Encryption
    Average: 8.9
    9.4
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Francisco, California
    Twitter
    @getvgs
    1,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    373 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

Users
  • Software Engineer
Industries
  • Financial Services
  • Banking
Market Segment
  • 51% Mid-Market
  • 45% Small-Business
VGS Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Audit Management
1
Compliance
1
Compliance Management
1
Customer Support
1
Customizability
1
Cons
Limited Functionality
1
Manual Intervention Required
1
Missing Features
1
VGS Platform features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.8
Data Encryption
Average: 9.3
8.9
Document Encryption
Average: 8.9
9.4
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
San Francisco, California
Twitter
@getvgs
1,373 Twitter followers
LinkedIn® Page
www.linkedin.com
373 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tor Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accessibility
    1
    Affordable
    1
    Centralized Management
    1
    Cybersecurity
    1
    Data Protection
    1
    Cons
    Connectivity Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tor features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Data Encryption
    Average: 9.3
    7.9
    Document Encryption
    Average: 8.9
    8.7
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tor
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @torproject
    454,786 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 26% Mid-Market
Tor Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accessibility
1
Affordable
1
Centralized Management
1
Cybersecurity
1
Data Protection
1
Cons
Connectivity Issues
1
Slow Performance
1
Tor features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
8.6
Data Encryption
Average: 9.3
7.9
Document Encryption
Average: 8.9
8.7
Policy Enforcement
Average: 8.7
Seller Details
Seller
Tor
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@torproject
454,786 Twitter followers
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Syman

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Encryption features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Data Encryption
    Average: 9.3
    9.4
    Document Encryption
    Average: 8.9
    8.1
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Syman

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 30% Mid-Market
Symantec Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Difficult Navigation
1
Symantec Encryption features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
8.7
Data Encryption
Average: 9.3
9.4
Document Encryption
Average: 8.9
8.1
Policy Enforcement
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,454 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
(34)4.2 out of 5
15th Easiest To Use in Encryption software
View top Consulting Services for Trend Micro Endpoint Encryption
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full di

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Endpoint Encryption features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.8
    Data Encryption
    Average: 9.3
    7.3
    Document Encryption
    Average: 8.9
    6.9
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full di

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 29% Small-Business
Trend Micro Endpoint Encryption features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
7.8
Data Encryption
Average: 9.3
7.3
Document Encryption
Average: 8.9
6.9
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(20)4.0 out of 5
View top Consulting Services for Oracle Advanced Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Advanced Security features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Data Encryption
    Average: 9.3
    8.8
    Document Encryption
    Average: 8.9
    8.3
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    820,686 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197,850 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 35% Mid-Market
Oracle Advanced Security features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
8.7
Data Encryption
Average: 9.3
8.8
Document Encryption
Average: 8.9
8.3
Policy Enforcement
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
820,686 Twitter followers
LinkedIn® Page
www.linkedin.com
197,850 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft SEAL is an open-source, cross-platform library developed by Microsoft Research that enables computations directly on encrypted data through homomorphic encryption. This allows developers to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft SEAL features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.3
    9.0
    Document Encryption
    Average: 8.9
    8.7
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,133,301 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft SEAL is an open-source, cross-platform library developed by Microsoft Research that enables computations directly on encrypted data through homomorphic encryption. This allows developers to

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 40% Enterprise
Microsoft SEAL features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.3
9.0
Document Encryption
Average: 8.9
8.7
Policy Enforcement
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,133,301 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
(17)4.6 out of 5
11th Easiest To Use in Encryption software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IXOPAY features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TokenEx
    Year Founded
    2010
    HQ Location
    Edmond, Oklahoma
    Twitter
    @TokenEx
    1,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 41% Mid-Market
IXOPAY features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
Seller
TokenEx
Year Founded
2010
HQ Location
Edmond, Oklahoma
Twitter
@TokenEx
1,213 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    7z is a high-compression archive format developed by 7-Zip, designed to offer superior compression ratios and robust encryption capabilities. Its open architecture allows for the integration of variou

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 7Z Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Integrations
    1
    Cons
    Limited Features
    1
    Outdated Interface
    1
    Poor Interface Design
    1
    Poor Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 7Z features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.3
    8.5
    Document Encryption
    Average: 8.9
    7.3
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    7-Zip
    HQ Location
    N/A
    Twitter
    @7zip
    1,145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

7z is a high-compression archive format developed by 7-Zip, designed to offer superior compression ratios and robust encryption capabilities. Its open architecture allows for the integration of variou

Users
No information available
Industries
No information available
Market Segment
  • 57% Mid-Market
  • 29% Enterprise
7Z Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Features
1
Integrations
1
Cons
Limited Features
1
Outdated Interface
1
Poor Interface Design
1
Poor Usability
1
7Z features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.3
8.5
Document Encryption
Average: 8.9
7.3
Policy Enforcement
Average: 8.7
Seller Details
Seller
7-Zip
HQ Location
N/A
Twitter
@7zip
1,145 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Folder Lock features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Data Encryption
    Average: 9.3
    9.2
    Document Encryption
    Average: 8.9
    9.6
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Beaverton, OR
    Twitter
    @NewSoftwaresInc
    2,015 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Folder Lock features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.2
Data Encryption
Average: 9.3
9.2
Document Encryption
Average: 8.9
9.6
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Beaverton, OR
Twitter
@NewSoftwaresInc
2,015 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

    Users
    • Consultant
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackBerry UEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    5
    Easy Access
    4
    File Sharing
    4
    Intuitive
    4
    Cons
    Expensive
    4
    Missing Features
    3
    Outdated Technology
    3
    Poor Interface Design
    3
    Poor UI
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackBerry UEM features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1984
    HQ Location
    Waterloo, Ontario
    Twitter
    @BlackBerry
    2,781,226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,098 employees on LinkedIn®
    Ownership
    NYSE:BB
Product Description
How are these determined?Information
This description is provided by the seller.

BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your secu

Users
  • Consultant
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 55% Enterprise
  • 27% Small-Business
BlackBerry UEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
5
Easy Access
4
File Sharing
4
Intuitive
4
Cons
Expensive
4
Missing Features
3
Outdated Technology
3
Poor Interface Design
3
Poor UI
3
BlackBerry UEM features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1984
HQ Location
Waterloo, Ontario
Twitter
@BlackBerry
2,781,226 Twitter followers
LinkedIn® Page
www.linkedin.com
2,098 employees on LinkedIn®
Ownership
NYSE:BB
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    @work is a secure workplace collaboration suite designed to bring your whole company together at an optimum value.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • @work Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Ease of Use
    1
    Efficiency
    1
    Security
    1
    Task Management
    1
    Cons
    Difficult Navigation
    1
    Learning Curve
    1
    Performance Issues
    1
    Slow Speed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • @work features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    eUnite
    Year Founded
    2003
    HQ Location
    Irvine, US
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

@work is a secure workplace collaboration suite designed to bring your whole company together at an optimum value.

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 31% Mid-Market
@work Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Ease of Use
1
Efficiency
1
Security
1
Task Management
1
Cons
Difficult Navigation
1
Learning Curve
1
Performance Issues
1
Slow Speed
1
@work features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
eUnite
Year Founded
2003
HQ Location
Irvine, US
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 43% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeraCrypt features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Data Encryption
    Average: 9.3
    9.4
    Document Encryption
    Average: 8.9
    8.5
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VeraCrypt
    HQ Location
    Paris
    Twitter
    @VeraCrypt_IDRIX
    4,893 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 43% Enterprise
  • 35% Mid-Market
VeraCrypt features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
9.4
Data Encryption
Average: 9.3
9.4
Document Encryption
Average: 8.9
8.5
Policy Enforcement
Average: 8.7
Seller Details
Seller
VeraCrypt
HQ Location
Paris
Twitter
@VeraCrypt_IDRIX
4,893 Twitter followers
LinkedIn® Page
www.linkedin.com
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cryptomator is a robust and innovative solution designed to empower individuals and organizations with the ability to secure their digital assets through the encryption of sensitive data in the realm

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 73% Small-Business
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cryptomator features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Data Encryption
    Average: 9.3
    9.8
    Document Encryption
    Average: 8.9
    7.3
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Skymatic
    Year Founded
    2016
    HQ Location
    Bonn, Germany
    Twitter
    @Cryptomator
    8,919 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cryptomator is a robust and innovative solution designed to empower individuals and organizations with the ability to secure their digital assets through the encryption of sensitive data in the realm

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 73% Small-Business
  • 27% Enterprise
Cryptomator features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Data Encryption
Average: 9.3
9.8
Document Encryption
Average: 8.9
7.3
Policy Enforcement
Average: 8.7
Seller Details
Seller
Skymatic
Year Founded
2016
HQ Location
Bonn, Germany
Twitter
@Cryptomator
8,919 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evervault is a developer-first platform that helps payment providers and merchants collect, process, and share sensitive cardholder data without ever exposing it in plaintext. Its modular building blo

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 59% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evervault features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Evervault
    Year Founded
    2019
    HQ Location
    Dublin, IE
    Twitter
    @evervault
    3,105 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evervault is a developer-first platform that helps payment providers and merchants collect, process, and share sensitive cardholder data without ever exposing it in plaintext. Its modular building blo

Users
No information available
Industries
  • Computer Software
Market Segment
  • 59% Small-Business
  • 29% Mid-Market
Evervault features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Evervault
Year Founded
2019
HQ Location
Dublin, IE
Twitter
@evervault
3,105 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Crypho Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Crypho features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Crypho
    Year Founded
    2012
    HQ Location
    Tonsberg, Vestfold
    Twitter
    @GetCrypho
    727 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Crypho is a Software-as-a-Service solution for end-to-end-encrypted enterprise file-sharing and communication.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
Crypho Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Simple
1
Cons
Integration Issues
1
Crypho features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Crypho
Year Founded
2012
HQ Location
Tonsberg, Vestfold
Twitter
@GetCrypho
727 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®