G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.
Vaultree fully encrypts data client side and allows for real-time scalable data processing and computations.
Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infr
1LimX was born to solve these problems: 100% Secure & Private From setting up master password, master key to encrypting/decrypting with ChaCha20-Poly1305 algorithm and storing data, all are happe
Aft India offers copy protection software and duplication solutions, USB Flash Drives, Video data file encryption, Software security protection, USB Dongles, Downloads, CD/DVD copy protection & CD
Atakama's Application Level Database Encryption (ALE solution offers robust protection for sensitive data by encrypting information both at rest and during transmission. Unlike traditional Transparent
Atakama Inc. is an information security software company that provides military-grade, file-level encryption. By using Atakama, enterprises prevent data exfiltration, enhance regulatory compliance, se
Bastion Infotech offers a comprehensive Software Licensing Solution designed to protect intellectual property and streamline license management for businesses of all sizes. Their solution ensures secu
BBM ® Enterprise offers secure text, voice, video, group chat and conferencing on any device, including smartphones and desktops. It’s the ideal communications solution for businesses and working pr
F5's BIG-IP SSL Orchestrator is a comprehensive solution designed to enhance SSL/TLS infrastructure by providing dynamic, policy-based decryption, encryption, and traffic steering through security ins
BlindHash Cyber's patented technology offers a new way to think about securing passwords. Until now, the more secure the password the slower the login process along with an expensive pricetag for secu
Bouncy Castle is a collection of APIs used in cryptography.
Challenger is offered to encrypt at a data and directory level and is ideal for all security aware users, especially in areas such as patent development, development engineers, journalists, lawyers an
CipherStash is the ultimate in data security. Our products use advanced queryable encryption technology that keeps data encrypted-in-use, rather than just at-rest. This ensures that access controls ar
Cloaked Search encrypts sensitive data before it goes to a search service. Only those with the correct key can search over the data. To unauthorized users without the key, including cloud platform adm
Next-Generation Intelligent Computing Cornami’s break-through software-defined TruStream® computing architecture can scale performance without penalties to deliver real-time computing for several cri