Introducing G2.ai, the future of software buying.Try now

Best Encryption Software - Page 7

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The best encryption software can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using sensitive data discovery software, administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

Secure data and files using ciphertext
Prepare either data at rest, data in transit, or data in use for encryption
Allow users to choose and manage files and their encryption settings
Show More
Show Less

Featured Encryption Software At A Glance

Free Plan Available:
The Data Krypter
Sponsored
Highest Performer:
Show LessShow More
Highest Performer:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
241 Listings in Encryption Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AES Crypt features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    5.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AES Crypt
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AES Crypt features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
5.0
Policy Enforcement
Average: 8.7
Seller Details
Seller
AES Crypt
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Secure Transfer you can transfer files, including large files, directly from your PC in a safe and fast manner. By creating a link or sending an e-mail you can send them to the chosen recipients,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • boolebox secure transfer features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Milan, IT
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Secure Transfer you can transfer files, including large files, directly from your PC in a safe and fast manner. By creating a link or sending an e-mail you can send them to the chosen recipients,

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
boolebox secure transfer features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Milan, IT
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherCore is an advanced secure computation engine developed by CipherMode Labs, designed to enable data analysis and machine learning on encrypted data without the need for decryption. This innovati

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CipherCore Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Encryption Security
    2
    Easy Setup
    1
    Efficiency
    1
    Efficiency Improvement
    1
    Cons
    Complex Setup
    1
    Data Integration
    1
    Limited Integration
    1
    Manual Intervention Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CipherCore features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Data Encryption
    Average: 9.3
    8.3
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CipherCore is an advanced secure computation engine developed by CipherMode Labs, designed to enable data analysis and machine learning on encrypted data without the need for decryption. This innovati

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 100% Small-Business
CipherCore Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Encryption Security
2
Easy Setup
1
Efficiency
1
Efficiency Improvement
1
Cons
Complex Setup
1
Data Integration
1
Limited Integration
1
Manual Intervention Required
1
CipherCore features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Data Encryption
Average: 9.3
8.3
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Databunker Pro is a self-hosted, GDPR-compliant secure vault and SDK designed to protect sensitive customer records, including Personally Identifiable Information (PII, Protected Health Information (P

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Databunker Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Databunker Pro is a self-hosted, GDPR-compliant secure vault and SDK designed to protect sensitive customer records, including Personally Identifiable Information (PII, Protected Health Information (P

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 100% Small-Business
Databunker Pro features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dell Encryption is a comprehensive data protection solution designed to secure sensitive information across various endpoints, including desktops, laptops, and external media. By offering both file-ba

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dell Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1984
    HQ Location
    Round Rock, TX
    Twitter
    @Dell
    794,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    132,992 employees on LinkedIn®
    Ownership
    NYSE: DELL
Product Description
How are these determined?Information
This description is provided by the seller.

Dell Encryption is a comprehensive data protection solution designed to secure sensitive information across various endpoints, including desktops, laptops, and external media. By offering both file-ba

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Dell Encryption features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1984
HQ Location
Round Rock, TX
Twitter
@Dell
794,531 Twitter followers
LinkedIn® Page
www.linkedin.com
132,992 employees on LinkedIn®
Ownership
NYSE: DELL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DriveCrypt is a disk encryption product that automatically encrypts data on desktop and laptop personal computers (PCs), as well as universal serial bus (USB) storage devices. The secure 1344-bit encr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DriveCrypt features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Data Encryption
    Average: 9.3
    8.3
    Document Encryption
    Average: 8.9
    8.3
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecurStar
    Year Founded
    1996
    HQ Location
    Germany
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DriveCrypt is a disk encryption product that automatically encrypts data on desktop and laptop personal computers (PCs), as well as universal serial bus (USB) storage devices. The secure 1344-bit encr

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DriveCrypt features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Data Encryption
Average: 9.3
8.3
Document Encryption
Average: 8.9
8.3
Policy Enforcement
Average: 8.7
Seller Details
Seller
SecurStar
Year Founded
1996
HQ Location
Germany
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DRM-X is a digital rights management solution that encrypts each file type differently to increase the security of sensitive information.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DRM-X features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DRM-X is a digital rights management solution that encrypts each file type differently to increase the security of sensitive information.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
DRM-X features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. N

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Encryptonizer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Integrations
    1
    Protection
    1
    Cons
    Limited OS Compatibility
    1
    Mobile Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Encryptonizer features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.3
    6.7
    Document Encryption
    Average: 8.9
    6.7
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Stamford, US
    Twitter
    @NetLibSecurity
    562 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. N

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Encryptonizer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Integrations
1
Protection
1
Cons
Limited OS Compatibility
1
Mobile Limitations
1
Encryptonizer features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.3
6.7
Document Encryption
Average: 8.9
6.7
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
1992
HQ Location
Stamford, US
Twitter
@NetLibSecurity
562 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fasoo Data Radar (FDR) is an advanced data discovery and classification solution designed to help organizations locate, analyze, and protect sensitive information across their infrastructure. FDR auto

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fasoo Data Radar features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fasoo
    Year Founded
    2000
    HQ Location
    Bethesda, US
    Twitter
    @Fasoocom
    233 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
    Ownership
    150900 (KOSDAQ)
Product Description
How are these determined?Information
This description is provided by the seller.

Fasoo Data Radar (FDR) is an advanced data discovery and classification solution designed to help organizations locate, analyze, and protect sensitive information across their infrastructure. FDR auto

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Small-Business
Fasoo Data Radar features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fasoo
Year Founded
2000
HQ Location
Bethesda, US
Twitter
@Fasoocom
233 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
Ownership
150900 (KOSDAQ)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RightsManager is a solution for document security practices by allowing to encrypt documents locally, so there is no need to upload unencrypted documents to an unknown server or file sharing site. It

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileOpen RightsManager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Santa Cruz, US
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RightsManager is a solution for document security practices by allowing to encrypt documents locally, so there is no need to upload unencrypted documents to an unknown server or file sharing site. It

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
FileOpen RightsManager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1997
HQ Location
Santa Cruz, US
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hermes is an end-to-end encrypted data storage and sharing framework designed to enforce zero-trust access control and facilitate secure collaboration. By integrating client-side SDKs, Hermes enables

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hermes features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, England
    Twitter
    @cossacklabs
    2,524 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hermes is an end-to-end encrypted data storage and sharing framework designed to enforce zero-trust access control and facilitate secure collaboration. By integrating client-side SDKs, Hermes enables

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hermes features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
London, England
Twitter
@cossacklabs
2,524 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely manage all of your organization's IronKey enterprise secure storage devices and DataLocker H300/H350 or Sentry EMS secure storage devices with cloud-based or on-premises management.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronKey EMS features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Data Encryption
    Average: 9.3
    0.0
    No information available
    5.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Overland Park, US
    Twitter
    @datalocker
    527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely manage all of your organization's IronKey enterprise secure storage devices and DataLocker H300/H350 or Sentry EMS secure storage devices with cloud-based or on-premises management.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
IronKey EMS features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
10.0
Data Encryption
Average: 9.3
0.0
No information available
5.0
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2007
HQ Location
Overland Park, US
Twitter
@datalocker
527 Twitter followers
LinkedIn® Page
www.linkedin.com
55 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSafeguard Security Suite is a secure encryption and digital signature solution for everyone, from big companies to individual users.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSafeguard Security Suite features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    5.0
    Document Encryption
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSafeguard Security Suite is a secure encryption and digital signature solution for everyone, from big companies to individual users.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
iSafeguard Security Suite features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
5.0
Document Encryption
Average: 8.9
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kaymera Encrypted Phone Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Device Security
    1
    Ease of Use
    1
    Security
    1
    Cons
    Limited Integration
    1
    Third-Party Dependence
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @KaymeraTech
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Kaymera Encrypted Phone Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Device Security
1
Ease of Use
1
Security
1
Cons
Limited Integration
1
Third-Party Dependence
1
Kaymera Encrypted Phone features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@KaymeraTech
182 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KodeFile is a key-on-demand encryption software solution. With a few clicks, encrypt your files and share the encryption keys. KodeFile generates, stores and shares the encryption keys for you!

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KodeFile Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Data Encryption
    Average: 9.3
    10.0
    Document Encryption
    Average: 8.9
    10.0
    Policy Enforcement
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Hoboken, US
    Twitter
    @1SQTechnologies
    3 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KodeFile is a key-on-demand encryption software solution. With a few clicks, encrypt your files and share the encryption keys. KodeFile generates, stores and shares the encryption keys for you!

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
KodeFile Encryption features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Data Encryption
Average: 9.3
10.0
Document Encryption
Average: 8.9
10.0
Policy Enforcement
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Hoboken, US
Twitter
@1SQTechnologies
3 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®