Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
CipherCore

By CipherMode Labs

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at CipherCore, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with CipherCore?

It's been two months since this profile received a new review
Leave a Review

CipherCore Reviews & Product Details

Product Avatar Image

Have you used CipherCore before?

Answer a few questions to help the CipherCore community

CipherCore Reviews (1)

Reviews

CipherCore Reviews (1)

4.0
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
HM
HR Business Partner
Retail
Mid-Market (51-1000 emp.)
"Centralized key management"
What do you like best about CipherCore?

It seems to me that CipherCore has nice interface and it is quite easy to use. About this, I realized managing enrollment of devices and encryption policies is easy. I suppose it is better compared to the cumbersome system that we were using before. Review collected by and hosted on G2.com.

What do you dislike about CipherCore?

This gave me a few opportunity to sign up some measure that wasn’t recognized by the listing. This can be a barrier primarily for those companies that are gravitating toward a massive number of devices. Review collected by and hosted on G2.com.

There are not enough reviews of CipherCore for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud BigQuery Logo
Google Cloud BigQuery
4.5
(1,208)
Analyze Big Data in the cloud with BigQuery. Run fast, SQL-like queries against multi-terabyte datasets in seconds. Scalable and easy to use, BigQuery gives you real-time insights about your data.
2
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,183)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
3
AppsFlyer Logo
AppsFlyer
4.5
(688)
AppsFlyer is the Modern Marketing Cloud that helps businesses transform complex data into clarity and growth. A foundation for unified, measurable, autonomous marketing, AppsFlyer breaks down silos across measurement, deep linking, data collaboration, and autonomous AI workflows. For more than a decade, AppsFlyer has been the leader in mobile attribution, trusted by over 15,000 businesses worldwide. To learn more, visit www.appsflyer.com.
4
Snowflake Logo
Snowflake
4.6
(678)
Snowflake’s platform eliminates data silos and simplifies architectures, so organizations can get more value from their data. The platform is designed as a single, unified product with automations that reduce complexity and help ensure everything “just works”. To support a wide range of workloads, it’s optimized for performance at scale no matter whether someone’s working with SQL, Python, or other languages. And it’s globally connected so organizations can securely access the most relevant content across clouds and regions, with one consistent experience.
5
Progress MOVEit Logo
Progress MOVEit
4.4
(525)
Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit – The Managed File Transfer Software from Progress to simplify and secure the file transfer tasks, save time, and improve communications.
6
Signal Logo
Signal
4.4
(452)
Signal is a privacy-focused messaging application that offers end-to-end encrypted communication for text messages, voice calls, and video calls. Designed to prioritize user security, Signal ensures that only the intended recipients can access the content of the communications, safeguarding against potential eavesdropping by third parties. The app is available across multiple platforms, including Android, iOS, Windows, macOS, and Linux, making it accessible to a wide range of users. Key Features and Functionality: - End-to-End Encryption: Utilizes the Signal Protocol to encrypt messages, voice calls, and video calls, ensuring that only the sender and recipient can access the content. - Secure Voice and Video Calls: Provides encrypted voice and video calling capabilities, including group calls, maintaining privacy across all communication channels. - No Data Collection: Operates without collecting user metadata, such as contact lists or communication logs, enhancing user privacy. - Disappearing Messages: Offers a feature where messages can be set to automatically delete after a specified time, adding an extra layer of security. - Open-Source Code: Maintains transparency by making its source code publicly available, allowing for independent security audits and fostering trust among users. Primary Value and User Solutions: Signal addresses the growing concern over digital privacy by providing a secure platform for personal and professional communication. By implementing robust encryption and minimizing data collection, it ensures that users can communicate without fear of surveillance or data breaches. This is particularly valuable for individuals and organizations that handle sensitive information and require a trustworthy communication tool to maintain confidentiality.
7
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(402)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
8
BlackBerry UEM Logo
BlackBerry UEM
3.8
(376)
BlackBerry UEM is a suite of solutions that all rely on the same foundation of security to secure the digital workplace. It keeps employees productive on any device, anywhere, while allowing your security team to manage diverse devices, ensure data security, support remote work, and reduce operational costs. Gain comprehensive control, enhance security, and streamline your IT operations.
9
Crossbeam Logo
Crossbeam
4.8
(274)
Crossbeam helps companies find overlapping customers and prospects while keeping the rest of their data private and secure.
10
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(264)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Product Avatar Image
CipherCore