Introducing G2.ai, the future of software buying.Try now

Best Encryption Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings
Show More
Show Less

Featured Encryption Software At A Glance

Free Plan Available:
Tresorit
Sponsored
Highest Performer:
Show LessShow More
Highest Performer:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
241 Listings in Encryption Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Enterprise
    • 18% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Field Encryption features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Data Encryption
    Average: 9.3
    8.3
    Document Encryption
    Average: 8.9
    8.9
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    492 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

Users
No information available
Industries
No information available
Market Segment
  • 73% Enterprise
  • 18% Small-Business
iSecurity Field Encryption features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Data Encryption
Average: 9.3
8.3
Document Encryption
Average: 8.9
8.9
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
492 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RealTyme is a communication and collaboration platform with security, privacy and humane technology at its core. Chat, call, meet & share, all within one trusted platform. Teams will increase focu

    Users
    No information available
    Industries
    • Marketing and Advertising
    Market Segment
    • 73% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RealTyme Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Features
    1
    Security
    1
    Video Calls
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RealTyme features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RealTyme
    Year Founded
    2007
    HQ Location
    Morges
    Twitter
    @adeyasecure
    135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RealTyme is a communication and collaboration platform with security, privacy and humane technology at its core. Chat, call, meet & share, all within one trusted platform. Teams will increase focu

Users
No information available
Industries
  • Marketing and Advertising
Market Segment
  • 73% Small-Business
  • 27% Mid-Market
RealTyme Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Features
1
Security
1
Video Calls
1
Cons
This product has not yet received any negative sentiments.
RealTyme features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RealTyme
Year Founded
2007
HQ Location
Morges
Twitter
@adeyasecure
135 Twitter followers
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stop unauthorised access to your important files and documents with the world’s strongest encryption. Encrypt your files and folders, protect your customer data and business IP, secure document collab

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GhostVolt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Security Focus
    5
    Ease of Use
    4
    Encryption
    4
    User-Friendly Interface
    4
    Cons
    Training Required
    3
    Expensive
    2
    Lacking Features
    2
    Limited Features
    2
    Outdated Interface
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GhostVolt features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Data Encryption
    Average: 9.3
    9.4
    Document Encryption
    Average: 8.9
    8.8
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Cambridge, MA
    Twitter
    @GhostVolt_
    83 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stop unauthorised access to your important files and documents with the world’s strongest encryption. Encrypt your files and folders, protect your customer data and business IP, secure document collab

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 37% Mid-Market
GhostVolt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Security Focus
5
Ease of Use
4
Encryption
4
User-Friendly Interface
4
Cons
Training Required
3
Expensive
2
Lacking Features
2
Limited Features
2
Outdated Interface
2
GhostVolt features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.8
Data Encryption
Average: 9.3
9.4
Document Encryption
Average: 8.9
8.8
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2018
HQ Location
Cambridge, MA
Twitter
@GhostVolt_
83 Twitter followers
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LogMeOnce Team Password Manager is a comprehensive solution designed to help teams efficiently manage and secure their passwords. It offers a user-friendly interface that simplifies password administr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LogMeOnce Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Reliability
    2
    2FA Security
    1
    Access Ease
    1
    Authentication
    1
    Cons
    Autofill Issues
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usability
    1
    Cost
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogMeOnce features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LogmeOnce
    Year Founded
    2011
    HQ Location
    McLean, VA
    Twitter
    @LogmeOnce
    9,525 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LogMeOnce Team Password Manager is a comprehensive solution designed to help teams efficiently manage and secure their passwords. It offers a user-friendly interface that simplifies password administr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 33% Small-Business
LogMeOnce Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Reliability
2
2FA Security
1
Access Ease
1
Authentication
1
Cons
Autofill Issues
1
Complexity
1
Complex Setup
1
Complex Usability
1
Cost
1
LogMeOnce features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
10.0
Policy Enforcement
Average: 8.7
Seller Details
Seller
LogmeOnce
Year Founded
2011
HQ Location
McLean, VA
Twitter
@LogmeOnce
9,525 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GnuPG features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GnuPG
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 36% Enterprise
GnuPG features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
GnuPG
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SWISS SECURIUM is a secure platform for communication and collaboration.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Small-Business
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SWISS SECURIUM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Convenience
    1
    Ease of Use
    1
    Easy Sharing
    1
    Security
    1
    Cons
    Connectivity Issues
    1
    Expensive
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SWISS SECURIUM features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Stein am Rhein
    Twitter
    @ALPEINSoftSWISS
    29 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SWISS SECURIUM is a secure platform for communication and collaboration.

Users
No information available
Industries
No information available
Market Segment
  • 70% Small-Business
  • 30% Enterprise
SWISS SECURIUM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Convenience
1
Ease of Use
1
Easy Sharing
1
Security
1
Cons
Connectivity Issues
1
Expensive
1
Performance Issues
1
SWISS SECURIUM features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Stein am Rhein
Twitter
@ALPEINSoftSWISS
29 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dropvault is a secure team collaboration and document sharing platform. With Dropvault every conversation, note, comment or document shared with your team or your customer is encrypted with a key that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dropvault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    File Sharing
    3
    Security
    3
    Ease of Use
    2
    Team Collaboration
    2
    Communication
    1
    Cons
    Expensive
    2
    Integration Issues
    1
    Time-Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dropvault features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Apptimi
    Year Founded
    2015
    HQ Location
    London, England
    Twitter
    @Apptimi
    212 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dropvault is a secure team collaboration and document sharing platform. With Dropvault every conversation, note, comment or document shared with your team or your customer is encrypted with a key that

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Dropvault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
File Sharing
3
Security
3
Ease of Use
2
Team Collaboration
2
Communication
1
Cons
Expensive
2
Integration Issues
1
Time-Consumption
1
Dropvault features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Apptimi
Year Founded
2015
HQ Location
London, England
Twitter
@Apptimi
212 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeChats — is a cross-platform solution, which ensures a military-grade security of your business and private communications. SafeChats either can be used as a standalone solution or can be integrate

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeChats features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeChats
    Year Founded
    2019
    HQ Location
    Taipei, TW
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeChats — is a cross-platform solution, which ensures a military-grade security of your business and private communications. SafeChats either can be used as a standalone solution or can be integrate

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
SafeChats features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SafeChats
Year Founded
2019
HQ Location
Taipei, TW
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Mid-Market
    • 10% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DiskCryptor features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.7
    Data Encryption
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

Users
No information available
Industries
No information available
Market Segment
  • 90% Mid-Market
  • 10% Enterprise
DiskCryptor features and usability ratings that predict user satisfaction
0.0
No information available
9.7
Data Encryption
Average: 9.3
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Encrypted, Private, Secure, Calls and Chats on Android and Apple iOS. StealthChat is an industrial strength chat app for professionals that value real privacy and security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 59% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StealthChat: Private Messaging features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Campbell, CA
    Twitter
    @MailSite
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Encrypted, Private, Secure, Calls and Chats on Android and Apple iOS. StealthChat is an industrial strength chat app for professionals that value real privacy and security

Users
No information available
Industries
No information available
Market Segment
  • 59% Small-Business
  • 29% Mid-Market
StealthChat: Private Messaging features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1995
HQ Location
Campbell, CA
Twitter
@MailSite
6 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sensitive Data Discovery, Data Masking. Access Controls.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mage Privacy Enhancing Technologies features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Data Encryption
    Average: 9.3
    9.2
    Document Encryption
    Average: 8.9
    9.4
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mage
    Year Founded
    2014
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sensitive Data Discovery, Data Masking. Access Controls.

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
Mage Privacy Enhancing Technologies features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.6
Data Encryption
Average: 9.3
9.2
Document Encryption
Average: 8.9
9.4
Policy Enforcement
Average: 8.7
Seller Details
Seller
Mage
Year Founded
2014
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication in companies and organizations. The messaging app is easy to use and doesn’t require a phone number

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Threema Work Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Communication
    2
    Ease of Use
    2
    Centralized Management
    1
    Compliance
    1
    Cons
    Limited Features
    2
    Complexity
    1
    Expensive
    1
    File Sharing Issues
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threema Work features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    6.7
    Data Encryption
    Average: 9.3
    6.7
    Document Encryption
    Average: 8.9
    6.7
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Wilmington, US
    Twitter
    @ThreemaApp
    27,156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication in companies and organizations. The messaging app is easy to use and doesn’t require a phone number

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Threema Work Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Communication
2
Ease of Use
2
Centralized Management
1
Compliance
1
Cons
Limited Features
2
Complexity
1
Expensive
1
File Sharing Issues
1
Learning Curve
1
Threema Work features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
6.7
Data Encryption
Average: 9.3
6.7
Document Encryption
Average: 8.9
6.7
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Wilmington, US
Twitter
@ThreemaApp
27,156 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuricVault Tokenization is a payment processing software that associates tokens with secure encrypted data. It encrypts the data it receives and then stores the encrypted data along with a random set

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuricVault features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    9.4
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @TokenEx
    1,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuricVault Tokenization is a payment processing software that associates tokens with secure encrypted data. It encrypts the data it receives and then stores the encrypted data along with a random set

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Enterprise
AuricVault features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
9.4
Policy Enforcement
Average: 8.7
Seller Details
Twitter
@TokenEx
1,213 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Baffle features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Data Encryption
    Average: 9.3
    9.2
    Document Encryption
    Average: 8.9
    9.2
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Baffle
    Year Founded
    2015
    HQ Location
    Santa Clara
    Twitter
    @baffleio
    236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requi

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Baffle features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Data Encryption
Average: 9.3
9.2
Document Encryption
Average: 8.9
9.2
Policy Enforcement
Average: 8.7
Seller Details
Seller
Baffle
Year Founded
2015
HQ Location
Santa Clara
Twitter
@baffleio
236 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sealit protects confidential information. Our password-less Zero Trust encryption allows you to secure all sensitive communication with your team and clients with just one click. Sealit seamlessly int

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sealit features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sealit
    HQ Location
    London, England
    Twitter
    @mysealitid
    1,740 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sealit protects confidential information. Our password-less Zero Trust encryption allows you to secure all sensitive communication with your team and clients with just one click. Sealit seamlessly int

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Sealit features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
Seller
Sealit
HQ Location
London, England
Twitter
@mysealitid
1,740 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®